USN-4345-1

See a problem?
Source
https://ubuntu.com/security/notices/USN-4345-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/USN-4345-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-4345-1
Related
Published
2020-04-28T23:54:52.407654Z
Modified
2020-04-28T23:54:52.407654Z
Summary
linux, linux-aws, linux-aws-hwe, linux-azure, linux-gcp, linux-gke-4.15, linux-hwe, linux-kvm, linux-oem, linux-oracle, linux-raspi2, linux-snapdragon vulnerabilities
Details

Al Viro discovered that the Linux kernel for s390x systems did not properly perform page table upgrades for kernel sections that use secondary address mode. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2020-11884)

It was discovered that the Intel Wi-Fi driver in the Linux kernel did not properly check for errors in some situations. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2019-16234)

Tristan Madani discovered that the block I/O tracing implementation in the Linux kernel contained a race condition. A local attacker could use this to cause a denial of service (system crash) or possibly expose sensitive information. (CVE-2019-19768)

It was discovered that the vhost net driver in the Linux kernel contained a stack buffer overflow. A local attacker with the ability to perform ioctl() calls on /dev/vhost-net could use this to cause a denial of service (system crash). (CVE-2020-10942)

It was discovered that the OV51x USB Camera device driver in the Linux kernel did not properly validate device metadata. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2020-11608)

It was discovered that the STV06XX USB Camera device driver in the Linux kernel did not properly validate device metadata. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2020-11609)

It was discovered that the Xirlink C-It USB Camera device driver in the Linux kernel did not properly validate device metadata. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2020-11668)

It was discovered that the virtual terminal implementation in the Linux kernel contained a race condition. A local attacker could possibly use this to cause a denial of service (system crash) or expose sensitive information. (CVE-2020-8648)

Jordy Zomer discovered that the floppy driver in the Linux kernel did not properly check for errors in some situations. A local attacker could possibly use this to cause a denial of service (system crash) or possibly expose sensitive information. (CVE-2020-9383)

References

Affected packages

Ubuntu:18.04:LTS / linux-gke-4.15

Package

Name
linux-gke-4.15

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.15.0-1058.61

Ecosystem specific

{
    "availability": "No subscription needed",
    "binaries": [
        {
            "linux-image-gke-4.15": "4.15.0.1058.62",
            "linux-image-gke": "4.15.0.1058.62",
            "linux-image-4.15.0-1058-gke": "4.15.0-1058.61"
        }
    ]
}

Ubuntu:18.04:LTS / linux-kvm

Package

Name
linux-kvm

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.15.0-1059.60

Ecosystem specific

{
    "availability": "No subscription needed",
    "binaries": [
        {
            "linux-image-4.15.0-1059-kvm": "4.15.0-1059.60",
            "linux-image-kvm": "4.15.0.1059.59"
        }
    ]
}

Ubuntu:18.04:LTS / linux-snapdragon

Package

Name
linux-snapdragon

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.15.0-1077.84

Ecosystem specific

{
    "availability": "No subscription needed",
    "binaries": [
        {
            "linux-image-snapdragon": "4.15.0.1077.80",
            "linux-image-4.15.0-1077-snapdragon": "4.15.0-1077.84"
        }
    ]
}

Ubuntu:18.04:LTS / linux-aws

Package

Name
linux-aws

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.15.0-1066.70

Ecosystem specific

{
    "availability": "No subscription needed",
    "binaries": [
        {
            "linux-image-4.15.0-1066-aws": "4.15.0-1066.70",
            "linux-image-aws-lts-18.04": "4.15.0.1066.69"
        }
    ]
}

Ubuntu:18.04:LTS / linux-raspi2

Package

Name
linux-raspi2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.15.0-1061.65

Ecosystem specific

{
    "availability": "No subscription needed",
    "binaries": [
        {
            "linux-image-4.15.0-1061-raspi2": "4.15.0-1061.65",
            "linux-image-raspi2": "4.15.0.1061.59"
        }
    ]
}

Ubuntu:18.04:LTS / linux-oracle

Package

Name
linux-oracle

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.15.0-1038.42

Ecosystem specific

{
    "availability": "No subscription needed",
    "binaries": [
        {
            "linux-image-4.15.0-1038-oracle": "4.15.0-1038.42",
            "linux-image-oracle-lts-18.04": "4.15.0.1038.47"
        }
    ]
}

Ubuntu:18.04:LTS / linux

Package

Name
linux

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.15.0-99.100

Ecosystem specific

{
    "availability": "No subscription needed",
    "binaries": [
        {
            "linux-image-4.15.0-99-lowlatency": "4.15.0-99.100",
            "linux-image-lowlatency-hwe-16.04": "4.15.0.99.89",
            "linux-image-4.15.0-99-generic-lpae": "4.15.0-99.100",
            "linux-image-4.15.0-99-generic": "4.15.0-99.100",
            "linux-image-virtual-hwe-16.04-edge": "4.15.0.99.89",
            "linux-image-generic-hwe-16.04": "4.15.0.99.89",
            "linux-image-generic-lpae-hwe-16.04": "4.15.0.99.89",
            "linux-image-lowlatency": "4.15.0.99.89",
            "linux-image-generic-lpae-hwe-16.04-edge": "4.15.0.99.89",
            "linux-image-generic": "4.15.0.99.89",
            "linux-image-lowlatency-hwe-16.04-edge": "4.15.0.99.89",
            "linux-image-virtual": "4.15.0.99.89",
            "linux-image-generic-hwe-16.04-edge": "4.15.0.99.89",
            "linux-image-generic-lpae": "4.15.0.99.89",
            "linux-image-virtual-hwe-16.04": "4.15.0.99.89"
        }
    ]
}

Ubuntu:18.04:LTS / linux-oem

Package

Name
linux-oem

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.15.0-1080.90

Ecosystem specific

{
    "availability": "No subscription needed",
    "binaries": [
        {
            "linux-image-4.15.0-1080-oem": "4.15.0-1080.90",
            "linux-image-oem": "4.15.0.1080.84"
        }
    ]
}

Ubuntu:16.04:LTS / linux-aws-hwe

Package

Name
linux-aws-hwe

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.15.0-1066.70~16.04.1

Ecosystem specific

{
    "availability": "No subscription needed",
    "binaries": [
        {
            "linux-image-4.15.0-1066-aws": "4.15.0-1066.70~16.04.1",
            "linux-image-aws-hwe": "4.15.0.1066.66"
        }
    ]
}

Ubuntu:16.04:LTS / linux-hwe

Package

Name
linux-hwe

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.15.0-99.100~16.04.1

Ecosystem specific

{
    "availability": "No subscription needed",
    "binaries": [
        {
            "linux-image-4.15.0-99-lowlatency": "4.15.0-99.100~16.04.1",
            "linux-image-lowlatency-hwe-16.04": "4.15.0.99.106",
            "linux-image-virtual-hwe-16.04-edge": "4.15.0.99.106",
            "linux-image-generic-hwe-16.04": "4.15.0.99.106",
            "linux-image-generic-lpae-hwe-16.04": "4.15.0.99.106",
            "linux-image-generic-lpae-hwe-16.04-edge": "4.15.0.99.106",
            "linux-image-4.15.0-99-generic-lpae": "4.15.0-99.100~16.04.1",
            "linux-image-lowlatency-hwe-16.04-edge": "4.15.0.99.106",
            "linux-image-4.15.0-99-generic": "4.15.0-99.100~16.04.1",
            "linux-image-generic-hwe-16.04-edge": "4.15.0.99.106",
            "linux-image-oem": "4.15.0.99.106",
            "linux-image-virtual-hwe-16.04": "4.15.0.99.106"
        }
    ]
}

Ubuntu:16.04:LTS / linux-gcp

Package

Name
linux-gcp

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.15.0-1061.65

Ecosystem specific

{
    "availability": "No subscription needed",
    "binaries": [
        {
            "linux-image-4.15.0-1061-gcp": "4.15.0-1061.65",
            "linux-image-gke": "4.15.0.1061.75",
            "linux-image-gcp": "4.15.0.1061.75"
        }
    ]
}

Ubuntu:16.04:LTS / linux-oracle

Package

Name
linux-oracle

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.15.0-1038.42~16.04.1

Ecosystem specific

{
    "availability": "No subscription needed",
    "binaries": [
        {
            "linux-image-4.15.0-1038-oracle": "4.15.0-1038.42~16.04.1",
            "linux-image-oracle": "4.15.0.1038.31"
        }
    ]
}

Ubuntu:16.04:LTS / linux-azure

Package

Name
linux-azure

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.15.0-1082.92~16.04.1

Ecosystem specific

{
    "availability": "No subscription needed",
    "binaries": [
        {
            "linux-image-azure": "4.15.0.1082.81",
            "linux-image-azure-edge": "4.15.0.1082.81",
            "linux-image-4.15.0-1082-azure": "4.15.0-1082.92~16.04.1"
        }
    ]
}