Critical Vulnerability Information Vulnerability ID USN-4135-2 Release Date September 18, 2019 Summary Multiple security issues in the Linux kernel have been fixed. Affected Packages linux: Linux kernel linux-aws: Linux kernel for Amazon Web Services (AWS) systems linux-azure: Linux kernel for Microsoft Azure Cloud systems linux-lts-trusty: Linux hardware enablement kernel from Trusty for Precise ESM linux-lts-xenial: Linux hardware enablement kernel from Xenial for Trusty Vulnerability Details On PowerPC architecture, the Linux kernel failed to properly handle interrupt exceptions in certain cases, potentially leading to exposure of sensitive information. (CVE-2019-15031) Update Instructions To apply all necessary changes, a system reboot is required after standard system updates. Due to unavoidable ABI changes, the kernel update has been assigned a new version number, requiring recompilation and reinstallation of all third-party kernel modules. Unless you have manually removed the standard kernel meta-packages (e.g., linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), standard system upgrades will automatically handle this. Affected Version Updates Ubuntu 14.04 LTS (trusty) linux-image-server: 3.13.0.173.184 linux-image-virtual-lts-xenial: 4.4.0.164.143 linux-image-powerpc-e500mc: 3.13.0.173.184 linux-image-generic-lts-xenial: 4.4.0.164.143 ... (more versions see screenshot) Ubuntu 12.04 (precise) linux-image-server: 3.2.0.143.158 linux-image-powerpc-smp: 3.2.0.143.158 linux-image-generic-lts-trusty: 3.13.0.173.161 ... (more versions see screenshot) References CVE-2019-15031 CVE-2019-15030 CVE-2019-14835 Related Notices USN-4135-1