Merge ~bromer/usn.ubuntu.com/+git/lsn:lsn into usn.ubuntu.com:master

Proposed by Ben Romer
Status: Merged
Merged at revision: 9eadd6f2477dbd20c714867ba0fd41020166d5f9
Proposed branch: ~bromer/usn.ubuntu.com/+git/lsn:lsn
Merge into: usn.ubuntu.com:master
Diff against target: 96 lines (+90/-0)
1 file modified
content/lsn/LSN-0066-1.md (+90/-0)
Reviewer Review Type Date Requested Status
Steve Beattie Approve
Review via email: mp+383279@code.launchpad.net

Description of the change

First attempt to use lp git merge to publish LSN information.

To post a comment you must log in.
Revision history for this message
Steve Beattie (sbeattie) wrote :

Hey Ben,

Thanks for this, it looks very good. I'm merging it with some fixups, as articulated in the (hopefully) included comments to the diff.

review: Approve
Revision history for this message
Ben Romer (bromer) wrote :

All of that is completely doable! Will fix it for the next LSN. Thank you for fixing this one up!

Preview Diff

[H/L] Next/Prev Comment, [J/K] Next/Prev File, [N/P] Next/Prev Hunk
1diff --git a/content/lsn/LSN-0066-1.md b/content/lsn/LSN-0066-1.md
2new file mode 100644
3index 0000000..c19eb91
4--- /dev/null
5+++ b/content/lsn/LSN-0066-1.md
6@@ -0,0 +1,90 @@
7+---
8+title: "LSN-0066-1: Kernel Live Patch Security Notice"
9+permalink: /lsn/0066-1/index.html
10+releases: [ubuntu-14.04-esm,ubuntu-16.04-lts,ubuntu-18.04-lts]
11+date: 2020-05-01 09:44:49
12+description: "Several security issues were fixed in the kernel."
13+---
14+
15+## Linux kernel vulnerabilities
16+
17+A security issue affects these releases of Ubuntu and its derivatives:
18+
19+* Ubuntu 18.04 LTS
20+* Ubuntu 16.04 LTS
21+* Ubuntu 14.04 ESM
22+
23+### Summary
24+
25+Several security issues were fixed in the kernel.
26+
27+### Software Description
28+
29+* linux - Linux kernel
30+* linux-aws - Linux kernel for Amazon Web Services (AWS) systems
31+* linux-azure - Linux kernel for Microsoft Azure Cloud systems
32+* linux-oem - Linux kernel for OEM processors
33+
34+### Details
35+
36+It was discovered that the virtual terminal implementation in the Linux
37+kernel did not properly handle resize events. A local attacker could use
38+this to expose sensitive information. (CVE-2020-8647)
39+
40+It was discovered that the virtual terminal implementation in the Linux
41+kernel contained a race condition. A local attacker could possibly use this
42+to cause a denial of service (system crash) or expose sensitive
43+information. (CVE-2020-8648)
44+
45+It was discovered that the virtual terminal implementation in the Linux
46+kernel did not properly handle resize events. A local attacker could use
47+this to expose sensitive information. (CVE-2020-8649)
48+
49+## Update instructions
50+
51+The problem can be corrected by updating your kernel livepatch to the following
52+versions:
53+
54+Ubuntu 18.04 LTS
55+: aws - 66.1
56+: generic - 66.1
57+: lowlatency - 66.1
58+: oem - 66.1
59+
60+Ubuntu 16.04 LTS
61+: aws - 66.1
62+: azure - 66.1
63+: generic - 66.1
64+: lowlatency - 66.1
65+
66+Ubuntu 14.04 ESM
67+: generic - 66.1
68+: lowlatency - 66.1
69+
70+## Support Information
71+
72+Kernels older than the levels listed below do not receive livepatch
73+updates. If you are running a kernel version earlier than the one listed
74+below, please upgrade your kernel as soon as possible.
75+
76+Ubuntu 18.04 LTS
77+: linux - 4.15.0-69
78+: linux-aws - 4.15.0-1054
79+: linux-azure - 5.0.0-1025
80+: linux-gcp - 5.0.0-1025
81+: linux-oem - 4.15.0-1063
82+
83+Ubuntu 16.04 LTS
84+: linux - 4.4.0-168
85+: linux-aws - 4.4.0-1098
86+: linux-azure - 4.15.0-1063
87+: linux-hwe - 4.15.0-69
88+
89+Ubuntu 14.04 ESM
90+: linux-lts-xenial - 4.4.0-168
91+
92+## References
93+
94+* [CVE-2020-8647](https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8647)
95+* [CVE-2020-8648](https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8648)
96+* [CVE-2020-8649](https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8649)

Subscribers

People subscribed via source and target branches