Jan 9th, 2020
The system could crash or be made to run programs as an administrator.
Package(s) : linux-image-ql-generic,
qlustar-module-core-xenial-amd64-10.1.1,
qlustar-module-core-bionic-amd64-11.0.0,
qlustar-module-core-centos7-amd64-11.0.0
Qlustar releases : 10.1, 11.0
Affected versions: All versions prior to this update
Vulnerability : privilege escalation/denial of service
Problem type : local
Qlustar-specific : no
CVE Id(s) : Not documented
A number of vulnerabilities and bugs have been discovered in the 4.19.x Linux kernel series since the last Qlustar 11.0 release based on 4.19.86. They may lead to a denial of service or privilege escalation. Please check the following web pages that contain details of the fixes in each release after 4.19.86 up to the current Qlustar kernel 4.19.93:
Linux kernel 4.19.93
Linux kernel 4.19.92
Linux kernel 4.19.91
Linux kernel 4.19.90
Linux kernel 4.19.89
Linux kernel 4.19.88
Linux kernel 4.19.87
A number of vulnerabilities and bugs have been discovered in the 4.14.x Linux kernel series since the last Qlustar 10.1 release based on 4.14.156. They may lead to a denial of service or privilege escalation. Please check the following web pages that contain details of the fixes in each release after 4.14.156 up to the current Qlustar kernel 4.14.162:
Linux kernel 4.14.162
Linux kernel 4.14.161
Linux kernel 4.14.160
Linux kernel 4.14.159
Linux kernel 4.14.158
Linux kernel 4.14.157
The problem can be corrected by updating your system to the following or more recent package versions (follow the Qlustar Update Instructions and on Qlustar 11 also perform the manual step '10. Adjust root bash shell initialization' as described in the Release Notes if you haven't done so yet):
linux-image-ql-generic 4.19.93-ql-generic-11.0-13
qlustar-module-core-bionic-amd64-11.0.0 11.0.0.6-b515f1278
qlustar-module-core-centos7-amd64-11.0.0 11.0.0.6-b515f1278
linux-image-ql-generic 4.14.162-ql-generic-10.1-24
qlustar-module-core-xenial-amd64-10.1.1 10.1.1.10-b509f1277