USN-4318-1

See a problem?
Source
https://ubuntu.com/security/notices/USN-4318-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/USN-4318-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-4318-1
Related
  • CVE-2020-8428
  • CVE-2020-8834
  • CVE-2020-8992
Published
2020-04-06T20:29:11.838789Z
Modified
2020-04-06T20:29:11.838789Z
Summary
linux, linux-hwe vulnerabilities
Details

Al Viro discovered that the vfs layer in the Linux kernel contained a use- after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly expose sensitive information (kernel memory). (CVE-2020-8428)

Gustavo Romero and Paul Mackerras discovered that the KVM implementation in the Linux kernel for PowerPC processors did not properly keep guest state separate from host state. A local attacker in a KVM guest could use this to cause a denial of service (host system crash). (CVE-2020-8834)

Shijie Luo discovered that the ext4 file system implementation in the Linux kernel did not properly check for a too-large journal size. An attacker could use this to construct a malicious ext4 image that, when mounted, could cause a denial of service (soft lockup). (CVE-2020-8992)

References

Affected packages

Ubuntu:18.04:LTS / linux

Package

Name
linux

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.15.0-96.97

Ecosystem specific

{
    "availability": "No subscription needed",
    "binaries": [
        {
            "linux-image-lowlatency-hwe-16.04": "4.15.0.96.87",
            "linux-image-4.15.0-96-lowlatency": "4.15.0-96.97",
            "linux-image-4.15.0-96-generic-lpae": "4.15.0-96.97",
            "linux-image-virtual-hwe-16.04-edge": "4.15.0.96.87",
            "linux-image-generic-hwe-16.04": "4.15.0.96.87",
            "linux-image-4.15.0-96-generic": "4.15.0-96.97",
            "linux-image-generic-lpae-hwe-16.04-edge": "4.15.0.96.87",
            "linux-image-lowlatency": "4.15.0.96.87",
            "linux-image-generic-lpae-hwe-16.04": "4.15.0.96.87",
            "linux-image-generic": "4.15.0.96.87",
            "linux-image-lowlatency-hwe-16.04-edge": "4.15.0.96.87",
            "linux-image-virtual": "4.15.0.96.87",
            "linux-image-generic-hwe-16.04-edge": "4.15.0.96.87",
            "linux-image-generic-lpae": "4.15.0.96.87",
            "linux-image-virtual-hwe-16.04": "4.15.0.96.87"
        }
    ]
}

Ubuntu:16.04:LTS / linux-hwe

Package

Name
linux-hwe

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.15.0-96.97~16.04.1

Ecosystem specific

{
    "availability": "No subscription needed",
    "binaries": [
        {
            "linux-image-lowlatency-hwe-16.04": "4.15.0.96.104",
            "linux-image-virtual-hwe-16.04-edge": "4.15.0.96.104",
            "linux-image-4.15.0-96-lowlatency": "4.15.0-96.97~16.04.1",
            "linux-image-4.15.0-96-generic-lpae": "4.15.0-96.97~16.04.1",
            "linux-image-generic-hwe-16.04": "4.15.0.96.104",
            "linux-image-generic-lpae-hwe-16.04-edge": "4.15.0.96.104",
            "linux-image-generic-lpae-hwe-16.04": "4.15.0.96.104",
            "linux-image-4.15.0-96-generic": "4.15.0-96.97~16.04.1",
            "linux-image-lowlatency-hwe-16.04-edge": "4.15.0.96.104",
            "linux-image-oem": "4.15.0.96.104",
            "linux-image-generic-hwe-16.04-edge": "4.15.0.96.104",
            "linux-image-virtual-hwe-16.04": "4.15.0.96.104"
        }
    ]
}