Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2018.0562 Kernel Live Patch Security Notice LSN-0035-1 26 February 2018 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Linux kernel Publisher: Ubuntu Operating System: Ubuntu Impact/Access: Access Privileged Data -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2017-5715 Reference: ASB-2018.0009 ASB-2018.0002.4 ESB-2018.0044 ESB-2018.0042.2 Original Bulletin: https://lists.ubuntu.com/archives/ubuntu-security-announce/2018-February/004295.html https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SpectreAndMeltdown - --------------------------BEGIN INCLUDED TEXT-------------------- ========================================================================== Kernel Live Patch Security Notice LSN-0035-1 February 22, 2018 linux vulnerability ========================================================================== A security issue affects these releases of Ubuntu: | Series | Base kernel | Arch | flavors | |------------------+--------------+----------+------------------| | Ubuntu 16.04 LTS | 4.4.0 | amd64 | generic | | Ubuntu 16.04 LTS | 4.4.0 | amd64 | lowlatency | | Ubuntu 14.04 LTS | 4.4.0 | amd64 | generic | | Ubuntu 14.04 LTS | 4.4.0 | amd64 | lowlatency | Summary: On February 22, fixes for CVE-2017-5715 were released into the Ubuntu Xenial kernel version 4.4.0-116.140. This CVE, also known as "Spectre," is caused by flaws in the design of speculative execution hardware in the computer's CPU, and could be used to access sensitive information in kernel memory. The mitigation for "Spectre" is accomplished using retpoline, a new compiler feature that prevents speculation when an indirect call is made. Unfortunately, it is not possible to generate a livepatch when a compiler change is required by a fix, as livepatches must be generated with the same compiler as the target kernel. Please plan to reboot into kernel version 4.4.0-116.140 or newer as soon as possible. Additional details on the vulnerability and our response can be found here: https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SpectreAndMeltdown Software Description: - - linux: Linux kernel Update instructions: The problem can be corrected by installing an updated kernel with these fixes and rebooting. References: CVE-2017-5715 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBWpOLv4x+lLeg9Ub1AQhxKQ//ew9m/GOCweoM8B6vKeG1L7bFJkhMfO6S IPQmR9NxqBiIh0TGx9rcPxwWEszX77O+8XnCGo+L35r/AICBJ47s/7Aptcria5PP xaCzFAtSRBiil0cFyCiW4qGmaUx6ETFj9BeDDA9TnVdreH+iurTJRkp5Y8Ghl6hY XKm82r/8J6xbxgPB7hl7xXVUsVdtJm7bT794+87VrzCCdBLhbnmB90sW6aT6mMGs vUEK1ZJVpz1M+zHbCNaTirPbReahTVZGPSbuXKgGa14g6fkVrey67j/uJHq6oynB vKXr0QysvlDh+KT3cnfC2bWz/o+sYnkqEs0Jzl+wRF7cH8PYi7vJFhu3MxoQyDE3 JX2DfOJNNNRPndvG1xPBJImgOlr4FQZW/pJcwtGsl7HNLnF1+hdBAO+Bgx5FcUwM ckQZmlfu9gHYXv5N2K5jQxzseELuiigM9M6vs1uoBgT5q5PYzoBUFbZQZ+k1GzLt KFWn7Zp+U09/+6Wjc/Na3O0D/AwIdrE3jJpNRHVR1VSPt5vFK+A10rO5+u18gosc 2A8ZWN/idygAQ55H9P+ztIbnFVQgAMQ2nej1BTiHiYs58DNGgu/57pTixdtcj63S NFICfzen64Larq17+whlZO5hdPYYZ7hYx+OuBkd983tCmO/0LF9meZ30SoSJJqiB DIIbrn4XXPM= =QX5q -----END PGP SIGNATURE-----