Operating System:

[Ubuntu]

Published:

16 August 2018

Protect yourself against future threats.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2018.2381
                       Linux kernel vulnerabilities
                              16 August 2018

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           kernel
Publisher:         Ubuntu
Operating System:  Ubuntu
Impact/Access:     Access Privileged Data -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2018-3646 CVE-2018-3620 

Reference:         ESB-2018.2370
                   ESB-2018.2369
                   ESB-2018.2368
                   ESB-2018.2355
                   ESB-2018.2348.2
                   ESB-2018.2344

Original Bulletin: 
   https://lists.ubuntu.com/archives/ubuntu-security-announce/2018-August/004540.html

- --------------------------BEGIN INCLUDED TEXT--------------------

==========================================================================
Kernel Live Patch Security Notice 0042-1
August 14, 2018

linux vulnerability
==========================================================================

A security issue affects these releases of Ubuntu:

| Series           | Base kernel  | Arch     | flavors          |
|------------------+--------------+----------+------------------|
| Ubuntu 14.04 LTS | 4.4.0        | amd64    | generic          |
| Ubuntu 14.04 LTS | 4.4.0        | amd64    | lowlatency       |
| Ubuntu 16.04 LTS | 4.4.0        | amd64    | generic          |
| Ubuntu 16.04 LTS | 4.4.0        | amd64    | lowlatency       |
| Ubuntu 18.04 LTS | 4.15.0       | amd64    | generic          |
| Ubuntu 18.04 LTS | 4.15.0       | amd64    | lowlatency       |

Summary:

On August 14, fixes for CVE-2018-3620 and CVE-2018-3646 were released into the
Ubuntu Xenial and Bionic kernels. These CVEs are security vulnerabilities 
caused by flaws in the design of speculative execution hardware in the 
computer's CPU. Researchers discovered that memory present in the L1 data
cache of an Intel CPU core may be visible to other processes running on the
same core.

Details on the vulnerability and our response can be found here:
https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/L1TF

Due to the high complexity of the fixes and the need for a corresponding
CPU microcode update for a complete fix, we are unable to livepatch these
CVEs. Please plan to reboot into an updated kernel as soon as possible.

Software Description:
- - linux: Linux kernel

Update instructions:

Users running Ubuntu 18.04 LTS should upgrade to kernel version 4.15.0-32.35
or later.

Users running Ubuntu 16.04 LTS or 14.04 LTS should upgrade to kernel version 
4.4.0-133.159 or later.

References:
  CVE-2018-3620, and CVE-2018-3646

- --

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=LTas
-----END PGP SIGNATURE-----