USN-4389-1

See a problem?
Source
https://ubuntu.com/security/notices/USN-4389-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/USN-4389-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-4389-1
Related
Published
2020-06-10T17:26:22.433919Z
Modified
2020-06-10T17:26:22.433919Z
Summary
linux, linux-aws, linux-azure, linux-gcp, linux-kvm, linux-oracle, linux-raspi, linux-riscv vulnerabilities
Details

It was discovered that the F2FS file system implementation in the Linux kernel did not properly perform bounds checking on xattrs in some situations. A local attacker could possibly use this to expose sensitive information (kernel memory). (CVE-2020-0067)

It was discovered that memory contents previously stored in microarchitectural special registers after RDRAND, RDSEED, and SGX EGETKEY read operations on Intel client and Xeon E3 processors may be briefly exposed to processes on the same or different processor cores. A local attacker could use this to expose sensitive information. (CVE-2020-0543)

Piotr Krysiuk discovered that race conditions existed in the file system implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash). (CVE-2020-12114)

It was discovered that the USB susbsystem's scatter-gather implementation in the Linux kernel did not properly take data references in some situations, leading to a use-after-free. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2020-12464)

Bui Quang Minh discovered that the XDP socket implementation in the Linux kernel did not properly validate meta-data passed from user space, leading to an out-of-bounds write vulnerability. A local attacker with the CAPNETADMIN capability could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2020-12659)

Dmitry Vyukov discovered that the SELinux netlink security hook in the Linux kernel did not validate messages in some situations. A privileged attacker could use this to bypass SELinux netlink restrictions. (CVE-2020-10751)

References

Affected packages

Ubuntu:20.04:LTS / linux-azure

Package

Name
linux-azure

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.0-1016.16

Ecosystem specific

{
    "availability": "No subscription needed",
    "binaries": [
        {
            "linux-image-azure": "5.4.0.1016.16",
            "linux-image-5.4.0-1016-azure": "5.4.0-1016.16"
        }
    ]
}

Ubuntu:20.04:LTS / linux-kvm

Package

Name
linux-kvm

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.0-1015.15

Ecosystem specific

{
    "availability": "No subscription needed",
    "binaries": [
        {
            "linux-image-5.4.0-1015-kvm": "5.4.0-1015.15",
            "linux-image-kvm": "5.4.0.1015.14"
        }
    ]
}

Ubuntu:20.04:LTS / linux-aws

Package

Name
linux-aws

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.0-1015.15

Ecosystem specific

{
    "availability": "No subscription needed",
    "binaries": [
        {
            "linux-image-5.4.0-1015-aws": "5.4.0-1015.15",
            "linux-image-aws": "5.4.0.1015.16"
        }
    ]
}

Ubuntu:20.04:LTS / linux-raspi

Package

Name
linux-raspi

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.0-1012.12

Ecosystem specific

{
    "availability": "No subscription needed",
    "binaries": [
        {
            "linux-image-5.4.0-1012-raspi": "5.4.0-1012.12",
            "linux-image-raspi": "5.4.0.1012.12",
            "linux-image-raspi2": "5.4.0.1012.12"
        }
    ]
}

Ubuntu:20.04:LTS / linux-riscv

Package

Name
linux-riscv

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.0-27.31

Ecosystem specific

{
    "availability": "No subscription needed",
    "binaries": [
        {
            "linux-image-5.4.0-27-generic": "5.4.0-27.31",
            "linux-image-virtual": "5.4.0.27.34",
            "linux-image-virtual-hwe-20.04": "5.4.0.27.34"
        }
    ]
}

Ubuntu:20.04:LTS / linux-oracle

Package

Name
linux-oracle

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.0-1015.15

Ecosystem specific

{
    "availability": "No subscription needed",
    "binaries": [
        {
            "linux-image-5.4.0-1015-oracle": "5.4.0-1015.15",
            "linux-image-oracle": "5.4.0.1015.14"
        }
    ]
}

Ubuntu:20.04:LTS / linux

Package

Name
linux

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.0-37.41

Ecosystem specific

{
    "availability": "No subscription needed",
    "binaries": [
        {
            "linux-image-5.4.0-37-generic-lpae": "5.4.0-37.41",
            "linux-image-generic-lpae-hwe-18.04-edge": "5.4.0.37.40",
            "linux-image-lowlatency-hwe-18.04": "5.4.0.37.40",
            "linux-image-virtual-hwe-18.04-edge": "5.4.0.37.40",
            "linux-image-generic-hwe-18.04": "5.4.0.37.40",
            "linux-image-generic-lpae-hwe-20.04": "5.4.0.37.40",
            "linux-image-lowlatency-hwe-18.04-edge": "5.4.0.37.40",
            "linux-image-generic-hwe-18.04-edge": "5.4.0.37.40",
            "linux-image-virtual-hwe-18.04": "5.4.0.37.40",
            "linux-image-oem-osp1": "5.4.0.37.40",
            "linux-image-generic-hwe-20.04": "5.4.0.37.40",
            "linux-image-generic-lpae-hwe-18.04": "5.4.0.37.40",
            "linux-image-5.4.0-37-generic": "5.4.0-37.41",
            "linux-image-lowlatency": "5.4.0.37.40",
            "linux-image-generic": "5.4.0.37.40",
            "linux-image-5.4.0-37-lowlatency": "5.4.0-37.41",
            "linux-image-lowlatency-hwe-20.04": "5.4.0.37.40",
            "linux-image-oem": "5.4.0.37.40",
            "linux-image-generic-lpae": "5.4.0.37.40"
        }
    ]
}

Ubuntu:20.04:LTS / linux-gcp

Package

Name
linux-gcp

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.0-1015.15

Ecosystem specific

{
    "availability": "No subscription needed",
    "binaries": [
        {
            "linux-image-5.4.0-1015-gcp": "5.4.0-1015.15",
            "linux-image-gke": "5.4.0.1015.14",
            "linux-image-gcp": "5.4.0.1015.14"
        }
    ]
}