LSN-0074-1: Kernel Live Patch Security Notice
26 January 2021
Several security issues were fixed in the kernel.
Releases
Software Description
- aws - Linux kernel for Amazon Web Services (AWS) systems - (>= 5.4.0-1009, >= 4.4.0-1098)
- aws-fips - Linux FIPS kernel for Amazon Web Services (AWS) systems - (>= 4.15.0-2030, >= 4.15.0-2030)
- azure - Linux kernel for Microsoft Azure Cloud systems - (>= 5.4.0-1010, >= 4.15.0-1078)
- azure-fips - Linux FIPS kernel for Microsoft Azure Cloud systems - (>= 4.15.0-2012)
- fips - Linux FIPS kernel - (>= 4.15.0-1045, >= 4.4.0-1049)
- gcp - Linux kernel for Google Cloud Platform (GCP) systems - (>= 5.4.0-1009)
- generic-4.15 - Linux kernel - (>= 4.15.0-69)
- generic-4.4 - Linux kernel - (>= 4.4.0-168, >= 4.4.0-168)
- generic-5.4 - Linux kernel - (>= 5.4.0-26)
- gkeop - Linux kernel for Google Container Engine (GKE) systems - (>= 5.4.0-1009)
- gkeop-5.4 - Linux kernel for Google Container Engine (GKE) systems - (>= 5.4.0-1007, >= 5.4.0-1007)
- lowlatency-4.15 - Linux kernel - (>= 4.15.0-69)
- lowlatency-4.4 - Linux kernel - (>= 4.4.0-168, >= 4.4.0-168)
- lowlatency-5.4 - Linux kernel - (>= 5.4.0-26)
- oem - Linux kernel for OEM systems - (>= 4.15.0-1063)
Details
Elena Petrova discovered that the pin controller device tree implementation
in the Linux kernel did not properly handle string references. A local
attacker could use this to expose sensitive information (kernel memory).
(CVE-2020-0427)
Andy Nguyen discovered that the Bluetooth A2MP implementation in the Linux
kernel did not properly initialize memory in some situations. A physically
proximate remote attacker could use this to expose sensitive information
(kernel memory). (CVE-2020-12352)
It was discovered that the GENEVE tunnel implementation in the Linux kernel
when combined with IPSec did not properly select IP routes in some
situations. An attacker could use this to expose sensitive information
(unencrypted network traffic). (CVE-2020-25645)
It was discovered that the LIO SCSI target implementation in the Linux
kernel performed insufficient identifier checking in certain XCOPY
requests. An attacker with access to at least one LUN in a multiple
backstore environment could use this to expose sensitive information or
modify data. (CVE-2020-28374)
Checking update status
The problem can be corrected in these Livepatch versions:
Kernel type | 20.04 | 18.04 | 16.04 | 14.04 |
---|---|---|---|---|
aws | 74.1 | 74.1 | 74.1 | — |
aws-fips | — | 74.1 | — | — |
azure | 74.1 | — | 74.1 | — |
azure-fips | — | 74.1 | — | — |
fips | — | 74.1 | 74.1 | — |
gcp | 74.1 | — | — | — |
generic-4.15 | — | 74.1 | — | — |
generic-4.4 | — | — | 74.1 | 74.1 |
generic-5.4 | 74.1 | — | — | — |
gkeop | — | 74.1 | — | — |
gkeop-5.4 | — | — | — | — |
lowlatency-4.15 | — | 74.1 | — | — |
lowlatency-4.4 | — | — | 74.1 | 74.1 |
lowlatency-5.4 | 74.1 | — | — | — |
oem | — | 74.1 | — | — |
To check your kernel type and Livepatch version, enter this command:
canonical-livepatch status