USN-4388-1

See a problem?
Source
https://ubuntu.com/security/notices/USN-4388-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4388-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-4388-1
Related
Published
2020-06-09T23:18:09.505607Z
Modified
2020-06-09T23:18:09.505607Z
Summary
linux-gke-5.0, linux-oem-osp1 vulnerabilities
Details

It was discovered that the F2FS file system implementation in the Linux kernel did not properly perform bounds checking on xattrs in some situations. A local attacker could possibly use this to expose sensitive information (kernel memory). (CVE-2020-0067)

It was discovered that memory contents previously stored in microarchitectural special registers after RDRAND, RDSEED, and SGX EGETKEY read operations on Intel client and Xeon E3 processors may be briefly exposed to processes on the same or different processor cores. A local attacker could use this to expose sensitive information. (CVE-2020-0543)

Piotr Krysiuk discovered that race conditions existed in the file system implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash). (CVE-2020-12114)

It was discovered that the USB susbsystem's scatter-gather implementation in the Linux kernel did not properly take data references in some situations, leading to a use-after-free. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2020-12464)

Bui Quang Minh discovered that the XDP socket implementation in the Linux kernel did not properly validate meta-data passed from user space, leading to an out-of-bounds write vulnerability. A local attacker with the CAPNETADMIN capability could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2020-12659)

Xiumei Mu discovered that the IPSec implementation in the Linux kernel did not properly encrypt IPv6 traffic in some situations. An attacker could use this to expose sensitive information. (CVE-2020-1749)

References

Affected packages

Ubuntu:18.04:LTS / linux-gke-5.0

Package

Name
linux-gke-5.0
Purl
pkg:deb/ubuntu/linux-gke-5.0@5.0.0-1042.43?arch=src?distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.0.0-1042.43

Affected versions

5.*

5.0.0-1011.11~18.04.1
5.0.0-1013.13~18.04.1
5.0.0-1015.15~18.04.1
5.0.0-1017.17~18.04.1
5.0.0-1020.20~18.04.1
5.0.0-1022.22~18.04.3
5.0.0-1023.23~18.04.2
5.0.0-1025.26~18.04.1
5.0.0-1026.27~18.04.2
5.0.0-1027.28~18.04.1
5.0.0-1029.30~18.04.1
5.0.0-1030.31
5.0.0-1032.33
5.0.0-1033.34
5.0.0-1035.36
5.0.0-1037.38

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "linux-image-unsigned-5.0.0-1042-gke-dbgsym": "5.0.0-1042.43",
            "linux-gke-5.0-headers-5.0.0-1042": "5.0.0-1042.43",
            "linux-modules-extra-5.0.0-1042-gke": "5.0.0-1042.43",
            "linux-tools-5.0.0-1042-gke": "5.0.0-1042.43",
            "linux-image-unsigned-5.0.0-1042-gke": "5.0.0-1042.43",
            "linux-modules-5.0.0-1042-gke": "5.0.0-1042.43",
            "linux-buildinfo-5.0.0-1042-gke": "5.0.0-1042.43",
            "linux-headers-5.0.0-1042-gke": "5.0.0-1042.43",
            "linux-gke-5.0-tools-5.0.0-1042": "5.0.0-1042.43"
        }
    ]
}

Ubuntu:18.04:LTS / linux-oem-osp1

Package

Name
linux-oem-osp1
Purl
pkg:deb/ubuntu/linux-oem-osp1@5.0.0-1059.64?arch=src?distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.0.0-1059.64

Affected versions

5.*

5.0.0-1010.11
5.0.0-1012.13
5.0.0-1015.16
5.0.0-1018.20
5.0.0-1020.22
5.0.0-1022.24
5.0.0-1024.27
5.0.0-1025.28
5.0.0-1027.31
5.0.0-1028.32
5.0.0-1030.34
5.0.0-1033.38
5.0.0-1037.42
5.0.0-1039.44
5.0.0-1040.45
5.0.0-1043.48
5.0.0-1046.51
5.0.0-1047.52
5.0.0-1050.55
5.0.0-1052.57

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "linux-oem-osp1-tools-5.0.0-1059": "5.0.0-1059.64",
            "mouse-modules-5.0.0-1059-oem-osp1-di": "5.0.0-1059.64",
            "vlan-modules-5.0.0-1059-oem-osp1-di": "5.0.0-1059.64",
            "block-modules-5.0.0-1059-oem-osp1-di": "5.0.0-1059.64",
            "linux-buildinfo-5.0.0-1059-oem-osp1": "5.0.0-1059.64",
            "pata-modules-5.0.0-1059-oem-osp1-di": "5.0.0-1059.64",
            "fs-core-modules-5.0.0-1059-oem-osp1-di": "5.0.0-1059.64",
            "linux-oem-osp1-headers-5.0.0-1059": "5.0.0-1059.64",
            "nic-pcmcia-modules-5.0.0-1059-oem-osp1-di": "5.0.0-1059.64",
            "plip-modules-5.0.0-1059-oem-osp1-di": "5.0.0-1059.64",
            "pcmcia-storage-modules-5.0.0-1059-oem-osp1-di": "5.0.0-1059.64",
            "md-modules-5.0.0-1059-oem-osp1-di": "5.0.0-1059.64",
            "floppy-modules-5.0.0-1059-oem-osp1-di": "5.0.0-1059.64",
            "nic-modules-5.0.0-1059-oem-osp1-di": "5.0.0-1059.64",
            "crypto-modules-5.0.0-1059-oem-osp1-di": "5.0.0-1059.64",
            "sata-modules-5.0.0-1059-oem-osp1-di": "5.0.0-1059.64",
            "fat-modules-5.0.0-1059-oem-osp1-di": "5.0.0-1059.64",
            "linux-oem-osp1-tools-host": "5.0.0-1059.64",
            "storage-core-modules-5.0.0-1059-oem-osp1-di": "5.0.0-1059.64",
            "virtio-modules-5.0.0-1059-oem-osp1-di": "5.0.0-1059.64",
            "nic-usb-modules-5.0.0-1059-oem-osp1-di": "5.0.0-1059.64",
            "linux-image-unsigned-5.0.0-1059-oem-osp1": "5.0.0-1059.64",
            "pcmcia-modules-5.0.0-1059-oem-osp1-di": "5.0.0-1059.64",
            "nic-shared-modules-5.0.0-1059-oem-osp1-di": "5.0.0-1059.64",
            "fs-secondary-modules-5.0.0-1059-oem-osp1-di": "5.0.0-1059.64",
            "linux-tools-5.0.0-1059-oem-osp1": "5.0.0-1059.64",
            "usb-modules-5.0.0-1059-oem-osp1-di": "5.0.0-1059.64",
            "nfs-modules-5.0.0-1059-oem-osp1-di": "5.0.0-1059.64",
            "input-modules-5.0.0-1059-oem-osp1-di": "5.0.0-1059.64",
            "fb-modules-5.0.0-1059-oem-osp1-di": "5.0.0-1059.64",
            "multipath-modules-5.0.0-1059-oem-osp1-di": "5.0.0-1059.64",
            "message-modules-5.0.0-1059-oem-osp1-di": "5.0.0-1059.64",
            "linux-udebs-oem-osp1": "5.0.0-1059.64",
            "linux-headers-5.0.0-1059-oem-osp1": "5.0.0-1059.64",
            "parport-modules-5.0.0-1059-oem-osp1-di": "5.0.0-1059.64",
            "serial-modules-5.0.0-1059-oem-osp1-di": "5.0.0-1059.64",
            "kernel-image-5.0.0-1059-oem-osp1-di": "5.0.0-1059.64",
            "firewire-core-modules-5.0.0-1059-oem-osp1-di": "5.0.0-1059.64",
            "ipmi-modules-5.0.0-1059-oem-osp1-di": "5.0.0-1059.64",
            "linux-modules-5.0.0-1059-oem-osp1": "5.0.0-1059.64",
            "ppp-modules-5.0.0-1059-oem-osp1-di": "5.0.0-1059.64",
            "linux-image-unsigned-5.0.0-1059-oem-osp1-dbgsym": "5.0.0-1059.64",
            "scsi-modules-5.0.0-1059-oem-osp1-di": "5.0.0-1059.64"
        }
    ]
}