{"id":29266,"date":"2019-02-08T06:56:26","date_gmt":"2019-02-07T21:56:26","guid":{"rendered":"https:\/\/jirak.net\/wp\/usn-3871-5-linux-kernel-azure-vulnerabilities\/"},"modified":"2019-02-08T07:35:13","modified_gmt":"2019-02-07T22:35:13","slug":"usn-3871-5-linux-kernel-azure-vulnerabilities","status":"publish","type":"post","link":"https:\/\/jirak.net\/wp\/usn-3871-5-linux-kernel-azure-vulnerabilities\/","title":{"rendered":"USN-3871-5: Linux kernel (Azure) vulnerabilities"},"content":{"rendered":"<p>USN-3871-5: Linux kernel (Azure) vulnerabilities<\/p>\n<h2 id=\"linux-azure-vulnerabilities\">linux-azure vulnerabilities<\/h2>\n<p>A security issue affects these releases of Ubuntu and its derivatives:<\/p>\n<ul>\n<li>Ubuntu 18.04 LTS<\/li>\n<li>Ubuntu 16.04 LTS<\/li>\n<li>Ubuntu 14.04 LTS<\/li>\n<\/ul>\n<h3 id=\"summary\">Summary<\/h3>\n<p>Several security issues were fixed in the Linux kernel.<\/p>\n<h3 id=\"software-description\">Software Description<\/h3>\n<ul>\n<li>linux-azure &#8211; Linux kernel for Microsoft Azure Cloud systems<\/li>\n<\/ul>\n<h3 id=\"details\">Details<\/h3>\n<p>Wen Xu discovered that a use-after-free vulnerability existed in the ext4<br \/>\nfilesystem implementation in the Linux kernel. An attacker could use this<br \/>\nto construct a malicious ext4 image that, when mounted, could cause a<br \/>\ndenial of service (system crash) or possibly execute arbitrary code.<br \/>\n(CVE-2018-10876, CVE-2018-10879)<\/p>\n<p>Wen Xu discovered that a buffer overflow existed in the ext4 filesystem<br \/>\nimplementation in the Linux kernel. An attacker could use this to construct<br \/>\na malicious ext4 image that, when mounted, could cause a denial of service<br \/>\n(system crash) or possibly execute arbitrary code. (CVE-2018-10877)<\/p>\n<p>Wen Xu discovered that an out-of-bounds write vulnerability existed in the<br \/>\next4 filesystem implementation in the Linux kernel. An attacker could use<br \/>\nthis to construct a malicious ext4 image that, when mounted, could cause a<br \/>\ndenial of service (system crash) or possibly execute arbitrary code.<br \/>\n(CVE-2018-10878, CVE-2018-10882)<\/p>\n<p>Wen Xu discovered that the ext4 filesystem implementation in the Linux<br \/>\nkernel did not properly ensure that xattr information remained in inode<br \/>\nbodies. An attacker could use this to construct a malicious ext4 image<br \/>\nthat, when mounted, could cause a denial of service (system crash).<br \/>\n(CVE-2018-10880)<\/p>\n<p>Wen Xu discovered that the ext4 file system implementation in the Linux<br \/>\nkernel could possibly perform an out of bounds write when updating the<br \/>\njournal for an inline file. An attacker could use this to construct a<br \/>\nmalicious ext4 image that, when mounted, could cause a denial of service<br \/>\n(system crash). (CVE-2018-10883)<\/p>\n<p>It was discovered that a race condition existed in the vsock address family<br \/>\nimplementation of the Linux kernel that could lead to a use-after-free<br \/>\ncondition. A local attacker in a guest virtual machine could use this to<br \/>\nexpose sensitive information (host machine kernel memory). (CVE-2018-14625)<\/p>\n<p>Cfir Cohen discovered that a use-after-free vulnerability existed in the<br \/>\nKVM implementation of the Linux kernel, when handling interrupts in<br \/>\nenvironments where nested virtualization is in use (nested KVM<br \/>\nvirtualization is not enabled by default in Ubuntu kernels). A local<br \/>\nattacker in a guest VM could possibly use this to gain administrative<br \/>\nprivileges in a host machine. (CVE-2018-16882)<\/p>\n<p>Jann Horn discovered that the procfs file system implementation in the<br \/>\nLinux kernel did not properly restrict the ability to inspect the kernel<br \/>\nstack of an arbitrary task. A local attacker could use this to expose<br \/>\nsensitive information. (CVE-2018-17972)<\/p>\n<p>Jann Horn discovered that the mremap() system call in the Linux kernel did<br \/>\nnot properly flush the TLB when completing, potentially leaving access to a<br \/>\nphysical page after it has been released to the page allocator. A local<br \/>\nattacker could use this to cause a denial of service (system crash), expose<br \/>\nsensitive information, or possibly execute arbitrary code. (CVE-2018-18281)<\/p>\n<p>Wei Wu discovered that the KVM implementation in the Linux kernel did not<br \/>\nproperly ensure that ioapics were initialized. A local attacker could use<br \/>\nthis to cause a denial of service (system crash). (CVE-2018-19407)<\/p>\n<p>It was discovered that the debug interface for the Linux kernel&rsquo;s HID<br \/>\nsubsystem did not properly perform bounds checking in some situations. An<br \/>\nattacker with access to debugfs could use this to cause a denial of service<br \/>\nor possibly gain additional privileges. (CVE-2018-9516)<\/p>\n<h2 id=\"update-instructions\">Update instructions<\/h2>\n<p>The problem can be corrected by updating your system to the following package versions:<\/p>\n<dl>\n<dt>Ubuntu 18.04 LTS<\/dt>\n<dd><a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/linux-azure\">linux-image-4.15.0-1037-azure<\/a> &#8211; <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/linux-azure\/4.15.0-1037.39\">4.15.0-1037.39<\/a><\/dd>\n<dd><a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/linux-azure\">linux-image-azure<\/a> &#8211; <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/linux-azure\/4.15.0-1037.39\">4.15.0.1037.37<\/a><\/dd>\n<dt>Ubuntu 16.04 LTS<\/dt>\n<dd><a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/linux-azure\">linux-image-4.15.0-1037-azure<\/a> &#8211; <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/linux-azure\/4.15.0-1037.39~16.04.1\">4.15.0-1037.39~16.04.1<\/a><\/dd>\n<dd><a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/linux-azure\">linux-image-azure<\/a> &#8211; <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/linux-azure\/4.15.0-1037.39~16.04.1\">4.15.0.1037.42<\/a><\/dd>\n<dt>Ubuntu 14.04 LTS<\/dt>\n<dd><a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/linux-azure\">linux-image-4.15.0-1037-azure<\/a> &#8211; <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/linux-azure\/4.15.0-1037.39~14.04.2\">4.15.0-1037.39~14.04.2<\/a><\/dd>\n<dd><a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/linux-azure\">linux-image-azure<\/a> &#8211; <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/linux-azure\/4.15.0-1037.39~14.04.2\">4.15.0.1037.24<\/a><\/dd>\n<\/dl>\n<p>To update your system, please follow these instructions: <a href=\"https:\/\/wiki.ubuntu.com\/Security\/Upgrades\">https:\/\/wiki.ubuntu.com\/Security\/Upgrades<\/a>.<\/p>\n<p>After a standard system update you need to reboot your computer to make<br \/>\nall the necessary changes.<\/p>\n<p>ATTENTION: Due to an unavoidable ABI change the kernel updates have<br \/>\nbeen given a new version number, which requires you to recompile and<br \/>\nreinstall all third party kernel modules you might have installed.<br \/>\nUnless you manually uninstalled the standard kernel metapackages<br \/>\n(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,<br \/>\nlinux-powerpc), a standard system upgrade will automatically perform<br \/>\nthis as well.<\/p>\n<h2 id=\"references\">References<\/h2>\n<ul>\n<li><a href=\"https:\/\/usn.ubuntu.com\/usn\/usn-3871-1\">USN-3871-1<\/a><\/li>\n<li><a href=\"https:\/\/people.canonical.com\/~ubuntu-security\/cve\/CVE-2018-10876\">CVE-2018-10876<\/a><\/li>\n<li><a href=\"https:\/\/people.canonical.com\/~ubuntu-security\/cve\/CVE-2018-10877\">CVE-2018-10877<\/a><\/li>\n<li><a href=\"https:\/\/people.canonical.com\/~ubuntu-security\/cve\/CVE-2018-10878\">CVE-2018-10878<\/a><\/li>\n<li><a href=\"https:\/\/people.canonical.com\/~ubuntu-security\/cve\/CVE-2018-10879\">CVE-2018-10879<\/a><\/li>\n<li><a href=\"https:\/\/people.canonical.com\/~ubuntu-security\/cve\/CVE-2018-10880\">CVE-2018-10880<\/a><\/li>\n<li><a href=\"https:\/\/people.canonical.com\/~ubuntu-security\/cve\/CVE-2018-10882\">CVE-2018-10882<\/a><\/li>\n<li><a href=\"https:\/\/people.canonical.com\/~ubuntu-security\/cve\/CVE-2018-10883\">CVE-2018-10883<\/a><\/li>\n<li><a href=\"https:\/\/people.canonical.com\/~ubuntu-security\/cve\/CVE-2018-14625\">CVE-2018-14625<\/a><\/li>\n<li><a href=\"https:\/\/people.canonical.com\/~ubuntu-security\/cve\/CVE-2018-16882\">CVE-2018-16882<\/a><\/li>\n<li><a href=\"https:\/\/people.canonical.com\/~ubuntu-security\/cve\/CVE-2018-17972\">CVE-2018-17972<\/a><\/li>\n<li><a href=\"https:\/\/people.canonical.com\/~ubuntu-security\/cve\/CVE-2018-18281\">CVE-2018-18281<\/a><\/li>\n<li><a href=\"https:\/\/people.canonical.com\/~ubuntu-security\/cve\/CVE-2018-19407\">CVE-2018-19407<\/a><\/li>\n<li><a href=\"https:\/\/people.canonical.com\/~ubuntu-security\/cve\/CVE-2018-9516\">CVE-2018-9516<\/a><\/li>\n<\/ul>\n<p>Source: <a href=\"https:\/\/usn.ubuntu.com\/3871-5\/\" target=\"_blank\">USN-3871-5: Linux kernel (Azure) vulnerabilities<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>USN-3871-5: Linux kernel (Azure) vulnerabilities linux-azure vulnerabilities A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 18.04 LTS Ubuntu 16.04 LTS Ubuntu 14.04 LTS Summary Several security issues were fixed in the Linux kernel. Software Description linux-azure &#8211; Linux kernel for Microsoft Azure Cloud systems Details Wen Xu discovered that a use-after-free vulnerability existed in the ext4 filesystem implementation in the Linux kernel. An attacker could use this to construct a malicious ext4 image that, when mounted, could cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2018-10876, CVE-2018-10879) Wen Xu discovered that a buffer overflow existed in the ext4 filesystem implementation in the Linux kernel. An attacker could use this to construct a malicious ext4 image that, when mounted, could cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2018-10877) <a class=\"mh-excerpt-more\" href=\"https:\/\/jirak.net\/wp\/usn-3871-5-linux-kernel-azure-vulnerabilities\/\" title=\"USN-3871-5: Linux kernel (Azure) vulnerabilities\">[ more&#8230; ]<\/a><\/p>\n<\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[586],"tags":[587],"class_list":["post-29266","post","type-post","status-publish","format-standard","hentry","category-ubuntu-usn","tag-ubuntu-usn"],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/29266","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/comments?post=29266"}],"version-history":[{"count":1,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/29266\/revisions"}],"predecessor-version":[{"id":29267,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/29266\/revisions\/29267"}],"wp:attachment":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/media?parent=29266"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/categories?post=29266"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/tags?post=29266"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}