USN-4368-1

See a problem?
Source
https://ubuntu.com/security/notices/USN-4368-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4368-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-4368-1
Related
Published
2020-05-19T20:04:28.166366Z
Modified
2020-05-19T20:04:28.166366Z
Summary
linux-gke-5.0, linux-oem-osp1 vulnerabilities
Details

Tristan Madani discovered that the file locking implementation in the Linux kernel contained a race condition. A local attacker could possibly use this to cause a denial of service or expose sensitive information. (CVE-2019-19769)

It was discovered that the Serial CAN interface driver in the Linux kernel did not properly initialize data. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2020-11494)

It was discovered that the linux kernel did not properly validate certain mount options to the tmpfs virtual memory file system. A local attacker with the ability to specify mount options could use this to cause a denial of service (system crash). (CVE-2020-11565)

It was discovered that the OV51x USB Camera device driver in the Linux kernel did not properly validate device metadata. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2020-11608)

It was discovered that the STV06XX USB Camera device driver in the Linux kernel did not properly validate device metadata. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2020-11609)

It was discovered that the Xirlink C-It USB Camera device driver in the Linux kernel did not properly validate device metadata. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2020-11668)

David Gibson discovered that the Linux kernel on Power9 CPUs did not properly save and restore Authority Mask registers state in some situations. A local attacker in a guest VM could use this to cause a denial of service (host system crash). (CVE-2020-11669)

It was discovered that the block layer in the Linux kernel contained a race condition leading to a use-after-free vulnerability. A local attacker could possibly use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2020-12657)

References

Affected packages

Ubuntu:18.04:LTS / linux-gke-5.0

Package

Name
linux-gke-5.0
Purl
pkg:deb/ubuntu/linux-gke-5.0@5.0.0-1037.38?arch=src?distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.0.0-1037.38

Affected versions

5.*

5.0.0-1011.11~18.04.1
5.0.0-1013.13~18.04.1
5.0.0-1015.15~18.04.1
5.0.0-1017.17~18.04.1
5.0.0-1020.20~18.04.1
5.0.0-1022.22~18.04.3
5.0.0-1023.23~18.04.2
5.0.0-1025.26~18.04.1
5.0.0-1026.27~18.04.2
5.0.0-1027.28~18.04.1
5.0.0-1029.30~18.04.1
5.0.0-1030.31
5.0.0-1032.33
5.0.0-1033.34
5.0.0-1035.36

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "linux-modules-5.0.0-1037-gke": "5.0.0-1037.38",
            "linux-modules-extra-5.0.0-1037-gke": "5.0.0-1037.38",
            "linux-image-unsigned-5.0.0-1037-gke-dbgsym": "5.0.0-1037.38",
            "linux-gke-5.0-headers-5.0.0-1037": "5.0.0-1037.38",
            "linux-buildinfo-5.0.0-1037-gke": "5.0.0-1037.38",
            "linux-headers-5.0.0-1037-gke": "5.0.0-1037.38",
            "linux-gke-5.0-tools-5.0.0-1037": "5.0.0-1037.38",
            "linux-tools-5.0.0-1037-gke": "5.0.0-1037.38",
            "linux-image-unsigned-5.0.0-1037-gke": "5.0.0-1037.38"
        }
    ]
}

Ubuntu:18.04:LTS / linux-oem-osp1

Package

Name
linux-oem-osp1
Purl
pkg:deb/ubuntu/linux-oem-osp1@5.0.0-1052.57?arch=src?distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.0.0-1052.57

Affected versions

5.*

5.0.0-1010.11
5.0.0-1012.13
5.0.0-1015.16
5.0.0-1018.20
5.0.0-1020.22
5.0.0-1022.24
5.0.0-1024.27
5.0.0-1025.28
5.0.0-1027.31
5.0.0-1028.32
5.0.0-1030.34
5.0.0-1033.38
5.0.0-1037.42
5.0.0-1039.44
5.0.0-1040.45
5.0.0-1043.48
5.0.0-1046.51
5.0.0-1047.52
5.0.0-1050.55

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "crypto-modules-5.0.0-1052-oem-osp1-di": "5.0.0-1052.57",
            "plip-modules-5.0.0-1052-oem-osp1-di": "5.0.0-1052.57",
            "linux-image-unsigned-5.0.0-1052-oem-osp1": "5.0.0-1052.57",
            "linux-oem-osp1-tools-5.0.0-1052": "5.0.0-1052.57",
            "pcmcia-storage-modules-5.0.0-1052-oem-osp1-di": "5.0.0-1052.57",
            "nic-usb-modules-5.0.0-1052-oem-osp1-di": "5.0.0-1052.57",
            "md-modules-5.0.0-1052-oem-osp1-di": "5.0.0-1052.57",
            "linux-modules-5.0.0-1052-oem-osp1": "5.0.0-1052.57",
            "message-modules-5.0.0-1052-oem-osp1-di": "5.0.0-1052.57",
            "ppp-modules-5.0.0-1052-oem-osp1-di": "5.0.0-1052.57",
            "usb-modules-5.0.0-1052-oem-osp1-di": "5.0.0-1052.57",
            "fat-modules-5.0.0-1052-oem-osp1-di": "5.0.0-1052.57",
            "fs-secondary-modules-5.0.0-1052-oem-osp1-di": "5.0.0-1052.57",
            "linux-headers-5.0.0-1052-oem-osp1": "5.0.0-1052.57",
            "pcmcia-modules-5.0.0-1052-oem-osp1-di": "5.0.0-1052.57",
            "block-modules-5.0.0-1052-oem-osp1-di": "5.0.0-1052.57",
            "linux-tools-5.0.0-1052-oem-osp1": "5.0.0-1052.57",
            "floppy-modules-5.0.0-1052-oem-osp1-di": "5.0.0-1052.57",
            "nic-pcmcia-modules-5.0.0-1052-oem-osp1-di": "5.0.0-1052.57",
            "multipath-modules-5.0.0-1052-oem-osp1-di": "5.0.0-1052.57",
            "pata-modules-5.0.0-1052-oem-osp1-di": "5.0.0-1052.57",
            "mouse-modules-5.0.0-1052-oem-osp1-di": "5.0.0-1052.57",
            "fb-modules-5.0.0-1052-oem-osp1-di": "5.0.0-1052.57",
            "scsi-modules-5.0.0-1052-oem-osp1-di": "5.0.0-1052.57",
            "firewire-core-modules-5.0.0-1052-oem-osp1-di": "5.0.0-1052.57",
            "sata-modules-5.0.0-1052-oem-osp1-di": "5.0.0-1052.57",
            "parport-modules-5.0.0-1052-oem-osp1-di": "5.0.0-1052.57",
            "virtio-modules-5.0.0-1052-oem-osp1-di": "5.0.0-1052.57",
            "linux-buildinfo-5.0.0-1052-oem-osp1": "5.0.0-1052.57",
            "linux-oem-osp1-tools-host": "5.0.0-1052.57",
            "fs-core-modules-5.0.0-1052-oem-osp1-di": "5.0.0-1052.57",
            "linux-udebs-oem-osp1": "5.0.0-1052.57",
            "storage-core-modules-5.0.0-1052-oem-osp1-di": "5.0.0-1052.57",
            "ipmi-modules-5.0.0-1052-oem-osp1-di": "5.0.0-1052.57",
            "linux-image-unsigned-5.0.0-1052-oem-osp1-dbgsym": "5.0.0-1052.57",
            "vlan-modules-5.0.0-1052-oem-osp1-di": "5.0.0-1052.57",
            "kernel-image-5.0.0-1052-oem-osp1-di": "5.0.0-1052.57",
            "input-modules-5.0.0-1052-oem-osp1-di": "5.0.0-1052.57",
            "serial-modules-5.0.0-1052-oem-osp1-di": "5.0.0-1052.57",
            "nfs-modules-5.0.0-1052-oem-osp1-di": "5.0.0-1052.57",
            "nic-modules-5.0.0-1052-oem-osp1-di": "5.0.0-1052.57",
            "nic-shared-modules-5.0.0-1052-oem-osp1-di": "5.0.0-1052.57",
            "linux-oem-osp1-headers-5.0.0-1052": "5.0.0-1052.57"
        }
    ]
}