Recently Canonical's development team released one of the regular updates that usually receive their LTS versions, in this case specifically for Ubuntu 14.04 LTS Trusty Tahr.
These updates contained bug fixes and especially security patches for the kernel of the System.
Canonical has released new fix and apologized for previous issues that were generated for some users of one of their LTS versions of Ubuntu.
New similar Specter flaws have recently been discovered which in turn affect Intel's x86 processors. They are called Terminal Failure F1 (L1TF) or Foreshadow.
About detected faults
The security update for the Kernel resolves two vulnerabilities of which one of them is the F1 terminal failure, as well as two other security flaws (CVE-2018-5390 and CVE-2018-5391) discovered by Juha-Matti Tilli in the TCP and IP implementations of the Linux kernel, which could allow attackers to cause a denial of service.
En Canonical's statement shared the following:
It was discovered that the memory present in the L1 data cache of an Intel CPU may be exposed to a malicious process running on the CPU.
This vulnerability is also known as L1 Terminal Bug (L1TF). In which a local attacker on a guest virtual machine could use this to expose information (memory from other guests or the host operating system). (CVE-2.018 to 3.646)
Juha-Matti Tilli found that the IP application in the Linux kernel performed operations in some situations in handling incoming packet fragments. A remote attacker could use this to cause a denial of service. (CVE-2.018 to 5391)
As it would normally be, these security bug fixes would be solved with the release of security patches for them.
Unfortunately, on Ubuntu 14.04 LTS systems (Trusty Tahr), users reported that fixes have also introduced a regression in linux kernel packages, which could cause the famous “Kernel Panic” for some users when initializing the operating system in certain desktop environments.
Unfortunately, the update introduced regressions that caused kernel crashes during boot in some environments, and prevented java applications from starting. This update fixes the issues. We apologize for the inconvenience.
Given these comments by users of this version of Ubuntu 14.04 LTS, Canonical had to take action on the matter and have to solve the problem immediately.
With which a new corrected version of the Linux Kernel was released, for Ubuntu 14.04 LTS Trusty Tahr users, asking all users to update their facilities as soon as possible.
You can consult the statement, In the following link.
Ubuntu 14.04 LTS update
As mentioned, this bug directly affects those who are Ubuntu 14.04 LTS users so it is extremely necessary that they carry out an update immediately, this in order to avoid that these failures affect the system.
The update can be done quite easily.
They can do it from the terminal by executing the following commands:
sudo apt-get update sudo apt-get upgrade sudo apt-get dist upgrade
Once this is done, the system should begin to update the packages, as well as the system's Kernel, downloading and installing the correction that canonical launched.
In the same way you can do this graphically, typing in the terminal:
update-manager
And this will show them the corresponding updates and they will only have to accept and install.
After a standard kernel update, it is recommended that users reboot their machines and, if necessary, recompile all kernel modules that can be installed, if they have manually uninstalled the kernel.
In the same way, you can consult the instructions provided by Canonical to be able to carry out a simple and safe update from your system.
Thanks!! I'm going to update!
Let me ask you a question..
When I installed xubuntu 16 at the time, the desktop would walk for a few hours and then the mouse cursor would freeze. 5 or 7 seconds passed and he walked again and after another 5 seconds he froze and so on indefinitely. Do you know what it was due to? if it was because of the kernel being my 32-bit pc or what?
Thanks again!
There are several factors, from video drivers, kernel version and even Xorg compatibility issues.