The following updates has been released for Ubuntu Linux:
LSN-0043-1: Linux kernel vulnerability
USN-3764-1: Zsh vulnerabilities
LSN-0043-1: Linux kernel vulnerability
USN-3764-1: Zsh vulnerabilities
LSN-0043-1: Linux kernel vulnerability
==========================================================================
Kernel Live Patch Security Notice 0043-1
September 11, 2018
linux vulnerability
==========================================================================
A security issue affects these releases of Ubuntu:
| Series | Base kernel | Arch | flavors |
|------------------+--------------+----------+------------------|
| Ubuntu 14.04 LTS | 4.4.0 | amd64 | generic |
| Ubuntu 14.04 LTS | 4.4.0 | amd64 | lowlatency |
| Ubuntu 16.04 LTS | 4.15.0 | amd64 | generic |
| Ubuntu 16.04 LTS | 4.15.0 | amd64 | lowlatency |
| Ubuntu 18.04 LTS | 4.15.0 | amd64 | generic |
| Ubuntu 18.04 LTS | 4.15.0 | amd64 | lowlatency |
Summary:
Several security issues were fixed in the kernel.
Software Description:
- linux: Linux kernel
Details:
Piotr Gabriel Kosinski and Daniel Shapira discovered a stack-based buffer
overflow in the CDROM driver implementation of the Linux kernel. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2018-11506)
Jann Horn discovered that the ext4 filesystem implementation in the Linux
kernel did not properly keep xattr information consistent in some
situations. An attacker could use this to construct a malicious ext4 image
that, when mounted, could cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2018-11412)
Silvio Cesare discovered that the generic VESA frame buffer driver in the
Linux kernel contained an integer overflow. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2018-13406)
It was discovered that the Linux kernel did not properly handle setgid file
creation when performed by a non-member of the group. A local attacker
could use this to gain elevated privileges. (CVE-2018-13405)
Shankara Pailoor discovered that the JFS filesystem implementation in the
Linux kernel contained a buffer overflow when handling extended attributes.
A local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2018-12233)
Update instructions:
The problem can be corrected by updating your livepatches to the following
versions:
| Kernel | Version | flavors |
|--------------------------+----------+--------------------------|
| 4.4.0-133.159 | 43.1 | generic, lowlatency |
| 4.4.0-133.159~14.04.1 | 43.1 | lowlatency, generic |
| 4.15.0-32.35 | 43.1 | lowlatency, generic |
| 4.15.0-32.35~16.04.1 | 43.4 | generic, lowlatency |
References:
CVE-2018-11506, CVE-2018-11412, CVE-2018-13406, CVE-2018-13405,
CVE-2018-12233
--
USN-3764-1: Zsh vulnerabilities
==========================================================================
Ubuntu Security Notice USN-3764-1
September 11, 2018
zsh vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
Summary:
Zsh could be made to execute arbitrary code if it received
a specially crafted script.
Software Description:
- zsh: shell with lots of features
Details:
It was discovered that Zsh incorrectly handled certain scripts.
An attacker could possibly use this issue to execute arbitrary code.
(CVE-2018-0502, CVE-2018-13259)
Richard Maciel Costa discovered that Zsh incorrectly handled certain
scripts. An attacker could possibly use this issue to execute arbitrary
code. (CVE-2018-1100)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 18.04 LTS:
zsh 5.4.2-3ubuntu3.1
Ubuntu 16.04 LTS:
zsh 5.1.1-1ubuntu2.3
Ubuntu 14.04 LTS:
zsh 5.0.2-3ubuntu6.3
After a standard system update you need to restart Zsh to make
all the necessary changes.
References:
https://usn.ubuntu.com/usn/usn-3764-1
CVE-2018-0502, CVE-2018-1100, CVE-2018-13259
Package Information:
https://launchpad.net/ubuntu/+source/zsh/5.4.2-3ubuntu3.1
https://launchpad.net/ubuntu/+source/zsh/5.1.1-1ubuntu2.3
https://launchpad.net/ubuntu/+source/zsh/5.0.2-3ubuntu6.3