USN-4369-2

Source
https://ubuntu.com/security/notices/USN-4369-2
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4369-2.json
JSON Data
https://api.osv.dev/v1/vulns/USN-4369-2
Published
2020-05-28T22:34:51Z
Modified
2026-02-10T04:41:50Z
Summary
linux, linux-raspi2, linux-raspi2-5.3 regression
Details

USN-4369-1 fixed vulnerabilities in the 5.3 Linux kernel. Unfortunately, that update introduced a regression in overlayfs. This update corrects the problem.

We apologize for the inconvenience.

Original advisory details:

It was discovered that the btrfs implementation in the Linux kernel did not properly detect that a block was marked dirty in some situations. An attacker could use this to specially craft a file system image that, when unmounted, could cause a denial of service (system crash). (CVE-2019-19377)

Tristan Madani discovered that the file locking implementation in the Linux kernel contained a race condition. A local attacker could possibly use this to cause a denial of service or expose sensitive information. (CVE-2019-19769)

It was discovered that the Serial CAN interface driver in the Linux kernel did not properly initialize data. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2020-11494)

It was discovered that the linux kernel did not properly validate certain mount options to the tmpfs virtual memory file system. A local attacker with the ability to specify mount options could use this to cause a denial of service (system crash). (CVE-2020-11565)

It was discovered that the OV51x USB Camera device driver in the Linux kernel did not properly validate device metadata. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2020-11608)

It was discovered that the STV06XX USB Camera device driver in the Linux kernel did not properly validate device metadata. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2020-11609)

It was discovered that the Xirlink C-It USB Camera device driver in the Linux kernel did not properly validate device metadata. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2020-11668)

It was discovered that the block layer in the Linux kernel contained a race condition leading to a use-after-free vulnerability. A local attacker could possibly use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2020-12657)

References

Affected packages

Ubuntu:18.04:LTS / linux-raspi2-5.3

Package

Name
linux-raspi2-5.3
Purl
pkg:deb/ubuntu/linux-raspi2-5.3@5.3.0-1026.28~18.04.1?arch=source&distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.3.0-1026.28~18.04.1

Affected versions

5.*
5.3.0-1017.19~18.04.1
5.3.0-1018.20~18.04.1
5.3.0-1019.21~18.04.1
5.3.0-1021.23~18.04.1
5.3.0-1022.24~18.04.1
5.3.0-1023.25~18.04.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "5.3.0-1026.28~18.04.1",
            "binary_name": "linux-buildinfo-5.3.0-1026-raspi2"
        },
        {
            "binary_version": "5.3.0-1026.28~18.04.1",
            "binary_name": "linux-headers-5.3.0-1026-raspi2"
        },
        {
            "binary_version": "5.3.0-1026.28~18.04.1",
            "binary_name": "linux-image-5.3.0-1026-raspi2"
        },
        {
            "binary_version": "5.3.0-1026.28~18.04.1",
            "binary_name": "linux-modules-5.3.0-1026-raspi2"
        },
        {
            "binary_version": "5.3.0-1026.28~18.04.1",
            "binary_name": "linux-raspi2-5.3-headers-5.3.0-1026"
        },
        {
            "binary_version": "5.3.0-1026.28~18.04.1",
            "binary_name": "linux-raspi2-5.3-tools-5.3.0-1026"
        },
        {
            "binary_version": "5.3.0-1026.28~18.04.1",
            "binary_name": "linux-tools-5.3.0-1026-raspi2"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4369-2.json"
cves_map
{
    "ecosystem": "Ubuntu:18.04:LTS",
    "cves": []
}