30 January 2018
Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2018.0290 Linux kernel (KVM) vulnerabilities 30 January 2018 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: kernel Publisher: Ubuntu Operating System: Ubuntu Impact/Access: Access Privileged Data -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2017-5753 CVE-2017-5715 Reference: ASB-2018.0033 ASB-2018.0030 ASB-2018.0009 ESB-2018.0047 ESB-2018.0046 ESB-2018.0044 ASB-2018.0002.4 ESB-2018.0042.2 Original Bulletin: http://www.ubuntu.com/usn/usn-3549-1 - --------------------------BEGIN INCLUDED TEXT-------------------- ========================================================================== Ubuntu Security Notice USN-3549-1 January 29, 2018 linux-kvm vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - - Ubuntu 16.04 LTS Summary: Several security issues were fixed in the Linux kernel. Software Description: - - linux-kvm: Linux kernel for cloud environments Details: Jann Horn discovered that microprocessors utilizing speculative execution and branch prediction may allow unauthorized memory reads via sidechannel attacks. This flaw is known as Spectre. A local attacker could use this to expose sensitive information, including kernel memory. (CVE-2017-5715, CVE-2017-5753) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 16.04 LTS: linux-image-4.4.0-1017-kvm 4.4.0-1017.22 linux-image-kvm 22.214.171.1247.16 Please note that fully mitigating CVE-2017-5715 (Spectre Variant 2) requires corresponding processor microcode/firmware updates or, in virtual environments, hypervisor updates. On i386 and amd64 architectures, the IBRS and IBPB features are required to enable the kernel mitigations. Ubuntu is working with Intel and AMD to provide future microcode updates that implement IBRS and IBPB as they are made available. Ubuntu users with a processor from a different vendor should contact the vendor to identify necessary firmware updates. Ubuntu will provide corresponding QEMU updates in the future for users of self-hosted virtual environments in coordination with upstream QEMU. Ubuntu users in cloud environments should contact the cloud provider to confirm that the hypervisor has been updated to expose the new CPU features to virtual machines. After a standard system update you need to reboot your computer to apply the necessary changes. References: https://www.ubuntu.com/usn/usn-3549-1 https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SpectreAndMeltdown CVE-2017-5715, CVE-2017-5753 Package Information: https://launchpad.net/ubuntu/+source/linux-kvm/4.4.0-1017.22 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to email@example.com and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: firstname.lastname@example.org Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBWm/f+Ix+lLeg9Ub1AQhhxg/8C1oQ0ox4D7heN9nVQiGaJby4xXXxMBwF N+tYifWcDJXWQSy9uIMQPcGZcpn1f2EgK3UYUKvkIGGbsBIfJUWIqripH4GOR4Dr j2T39tahcmXSyr0c8dZxnJ2UyHpaCLIf9C7TckBtknXeIxQoL1K7ZflReoMvRkWY cBKoxqADiGUvU+BY1uNfGIp9ihELy+ndqS8wObmE9kQd7m+m2Y/O7PUfHNSKO45p jd4RLe4kVp3ZLFK+Jwkj3QFa7aZ+6UNM8JuISRT4hxeFy/S2O6mgBl+GEEqVH9YR qYUgVm8NmuoEZItQvNol1PpdPFn37hyLPTaeF6YnMpK4x6jHx8N+4nrYNTNjjoUy 2bIEtpxy/1F57T3Nz5U2dHzQN8eqUdodq0mBs28izTvsbGfQxVwpjuNZB7OOKoyJ qpbKHif0Mjc8osrRjBVADvOcK/M97NhDiY1O19/OuBAMwITfmxWTM34rk1BmpQuk HEAKszTZh7z3UH++7Gb6xqY1CKRglXAhEm1SwAnzlTfeKvFIJWpLuScpjDGcrpBc Y7wtwWK2e/gQYPg+1dhamdOU19utjwUYoY5t0PEio7xMo0v9lqMMaRWATbuycmaP ir3k6D5CzpZvnoJzJ0Tux3aLPSupxt7Nu47rSkWPg3yZB/9V26BnRNK18BYgNsYh 7ZynVLXVZSQ= =a4V/ -----END PGP SIGNATURE-----