USN-4427-1: Linux kernel vulnerabilities
27 July 2020
Several security issues were fixed in the Linux kernel.
Releases
Packages
- linux - Linux kernel
- linux-aws - Linux kernel for Amazon Web Services (AWS) systems
- linux-kvm - Linux kernel for cloud environments
- linux-lts-xenial - Linux hardware enablement kernel from Xenial for Trusty
- linux-raspi2 - Linux kernel for Raspberry Pi (V7) systems
- linux-snapdragon - Linux kernel for Qualcomm Snapdragon processors
Details
It was discovered that the Kvaser CAN/USB driver in the Linux kernel did
not properly initialize memory in certain situations. A local attacker
could possibly use this to expose sensitive information (kernel memory).
(CVE-2019-19947)
Chuhong Yuan discovered that go7007 USB audio device driver in the Linux
kernel did not properly deallocate memory in some failure conditions. A
physically proximate attacker could use this to cause a denial of service
(memory exhaustion). (CVE-2019-20810)
Jason A. Donenfeld discovered that the ACPI implementation in the Linux
kernel did not properly restrict loading SSDT code from an EFI variable. A
privileged attacker could use this to bypass Secure Boot lockdown
restrictions and execute arbitrary code in the kernel. (CVE-2019-20908)
It was discovered that the elf handling code in the Linux kernel did not
initialize memory before using it in certain situations. A local attacker
could use this to possibly expose sensitive information (kernel memory).
(CVE-2020-10732)
It was discovered that the Linux kernel did not correctly apply Speculative
Store Bypass Disable (SSBD) mitigations in certain situations. A local
attacker could possibly use this to expose sensitive information.
(CVE-2020-10766)
It was discovered that the Linux kernel did not correctly apply Indirect
Branch Predictor Barrier (IBPB) mitigations in certain situations. A local
attacker could possibly use this to expose sensitive information.
(CVE-2020-10767)
It was discovered that the Linux kernel could incorrectly enable Indirect
Branch Speculation after it has been disabled for a process via a prctl()
call. A local attacker could possibly use this to expose sensitive
information. (CVE-2020-10768)
Mauricio Faria de Oliveira discovered that the aufs implementation in the
Linux kernel improperly managed inode reference counts in the
vfsub_dentry_open() method. A local attacker could use this vulnerability
to cause a denial of service. (CVE-2020-11935)
It was discovered that the Virtual Terminal keyboard driver in the Linux
kernel contained an integer overflow. A local attacker could possibly use
this to have an unspecified impact. (CVE-2020-13974)
It was discovered that the efi subsystem in the Linux kernel did not handle
memory allocation failures during early boot in some situations. A local
attacker could possibly use this to cause a denial of service (system
crash). (CVE-2019-12380)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 16.04
-
linux-image-4.4.0-1077-kvm
-
4.4.0-1077.84
-
linux-image-4.4.0-1111-aws
-
4.4.0-1111.123
-
linux-image-4.4.0-1136-raspi2
-
4.4.0-1136.145
-
linux-image-4.4.0-1140-snapdragon
-
4.4.0-1140.148
-
linux-image-4.4.0-186-generic
-
4.4.0-186.216
-
linux-image-4.4.0-186-generic-lpae
-
4.4.0-186.216
-
linux-image-4.4.0-186-lowlatency
-
4.4.0-186.216
-
linux-image-4.4.0-186-powerpc-e500mc
-
4.4.0-186.216
-
linux-image-4.4.0-186-powerpc-smp
-
4.4.0-186.216
-
linux-image-4.4.0-186-powerpc64-emb
-
4.4.0-186.216
-
linux-image-4.4.0-186-powerpc64-smp
-
4.4.0-186.216
-
linux-image-aws
-
4.4.0.1111.116
-
linux-image-generic
-
4.4.0.186.192
-
linux-image-generic-lpae
-
4.4.0.186.192
-
linux-image-kvm
-
4.4.0.1077.75
-
linux-image-lowlatency
-
4.4.0.186.192
-
linux-image-powerpc-e500mc
-
4.4.0.186.192
-
linux-image-powerpc-smp
-
4.4.0.186.192
-
linux-image-powerpc64-emb
-
4.4.0.186.192
-
linux-image-powerpc64-smp
-
4.4.0.186.192
-
linux-image-raspi2
-
4.4.0.1136.136
-
linux-image-snapdragon
-
4.4.0.1140.132
-
linux-image-virtual
-
4.4.0.186.192
Ubuntu 14.04
-
linux-image-4.4.0-1075-aws
-
4.4.0-1075.79
-
linux-image-4.4.0-186-generic
-
4.4.0-186.216~14.04.1
-
linux-image-4.4.0-186-generic-lpae
-
4.4.0-186.216~14.04.1
-
linux-image-4.4.0-186-lowlatency
-
4.4.0-186.216~14.04.1
-
linux-image-4.4.0-186-powerpc-e500mc
-
4.4.0-186.216~14.04.1
-
linux-image-4.4.0-186-powerpc-smp
-
4.4.0-186.216~14.04.1
-
linux-image-4.4.0-186-powerpc64-emb
-
4.4.0-186.216~14.04.1
-
linux-image-4.4.0-186-powerpc64-smp
-
4.4.0-186.216~14.04.1
-
linux-image-aws
-
4.4.0.1075.72
-
linux-image-generic-lpae-lts-xenial
-
4.4.0.186.163
-
linux-image-generic-lts-xenial
-
4.4.0.186.163
-
linux-image-lowlatency-lts-xenial
-
4.4.0.186.163
-
linux-image-powerpc-e500mc-lts-xenial
-
4.4.0.186.163
-
linux-image-powerpc-smp-lts-xenial
-
4.4.0.186.163
-
linux-image-powerpc64-emb-lts-xenial
-
4.4.0.186.163
-
linux-image-powerpc64-smp-lts-xenial
-
4.4.0.186.163
-
linux-image-virtual-lts-xenial
-
4.4.0.186.163
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
Related notices
- USN-4439-1: linux-image-gke-5.0, linux-oem-osp1, linux-image-oem-osp1, linux-gke-5.0, linux-image-5.0.0-1065-oem-osp1, linux-image-5.0.0-1045-gke
- USN-4440-1: linux-image-5.3.0-1034-azure, linux-hwe, linux-image-5.3.0-64-generic, linux-image-5.3.0-64-generic-lpae, linux-image-azure, linux-image-5.3.0-1030-oracle, linux-image-5.3.0-1032-gke, linux-raspi2-5.3, linux-image-raspi2-hwe-18.04, linux-image-5.3.0-1032-aws, linux-image-gke-5.3, linux-image-gcp, linux-image-oracle, linux-azure-5.3, linux-gcp-5.3, linux-image-5.3.0-1032-gcp, linux-gke-5.3, linux-image-aws, linux-aws-5.3, linux-image-gkeop-5.3, linux-image-5.3.0-1030-raspi2, linux-image-5.3.0-64-lowlatency, linux-oracle-5.3
- USN-4483-1: linux-azure, linux-image-5.4.0-45-generic-lpae, linux-image-5.4.0-1023-azure, linux-image-lowlatency-hwe-20.04, linux-oracle, linux-gcp-5.4, linux-image-virtual-hwe-18.04-edge, linux-image-virtual, linux-image-5.4.0-1022-oracle, linux-image-oem, linux-aws-5.4, linux-image-aws-edge, linux-image-azure, linux-image-generic-lpae, linux-image-raspi2-hwe-18.04, linux-image-generic-hwe-20.04, linux-gcp, linux, linux-image-generic-hwe-18.04, linux-image-generic-lpae-hwe-18.04, linux-image-lowlatency-hwe-18.04-edge, linux-image-oem-osp1, linux-hwe-5.4, linux-image-5.4.0-45-generic, linux-image-5.4.0-1022-aws, linux-azure-5.4, linux-image-azure-edge, linux-image-generic-lpae-hwe-18.04-edge, linux-image-lowlatency-hwe-18.04, linux-image-generic-lpae-hwe-20.04, linux-image-raspi, linux-image-raspi-hwe-18.04, linux-image-raspi2, linux-image-gcp, linux-image-5.4.0-45-lowlatency, linux-image-raspi-hwe-18.04-edge, linux-image-oracle, linux-image-5.4.0-1022-gcp, linux-raspi-5.4, linux-image-oracle-edge, linux-image-virtual-hwe-18.04, linux-image-aws, linux-image-lowlatency, linux-kvm, linux-raspi, linux-image-gke-5.4, linux-image-kvm, linux-image-virtual-hwe-20.04, linux-image-raspi2-hwe-18.04-edge, linux-image-generic, linux-image-gcp-edge, linux-image-snapdragon-hwe-18.04-edge, linux-aws, linux-image-gke, linux-image-snapdragon-hwe-18.04, linux-image-generic-hwe-18.04-edge, linux-image-gkeop-5.4, linux-image-5.4.0-1016-raspi, linux-oracle-5.4
- USN-4485-1: linux-azure, linux-gke-4.15, linux-image-generic-lpae-hwe-16.04, linux-aws-hwe, linux-oracle, linux-azure-4.15, linux-image-generic-lpae-hwe-16.04-edge, linux-hwe, linux-image-4.15.0-1068-raspi2, linux-image-4.15.0-115-lowlatency, linux-image-generic-hwe-16.04-edge, linux-image-virtual, linux-image-lowlatency-hwe-16.04, linux-image-oem, linux-image-generic-hwe-16.04, linux-image-generic-lpae, linux-image-azure, linux-gcp, linux, linux-image-aws-lts-18.04, linux-image-oracle-lts-18.04, linux-image-aws-hwe, linux-image-azure-edge, linux-image-gcp-lts-18.04, linux-image-raspi2, linux-image-virtual-hwe-16.04, linux-snapdragon, linux-image-snapdragon, linux-image-virtual-hwe-16.04-edge, linux-image-gcp, linux-image-oracle, linux-gcp-4.15, linux-image-4.15.0-1084-snapdragon, linux-image-4.15.0-1094-oem, linux-image-4.15.0-1051-oracle, linux-image-lowlatency, linux-kvm, linux-image-lowlatency-hwe-16.04-edge, linux-image-4.15.0-1081-gcp, linux-raspi2, linux-image-kvm, linux-image-4.15.0-1067-gke, linux-image-4.15.0-1080-aws, linux-image-gke-4.15, linux-image-4.15.0-1093-azure, linux-image-azure-lts-18.04, linux-oem, linux-image-4.15.0-1072-kvm, linux-image-generic, linux-aws, linux-image-gke, linux-image-4.15.0-115-generic-lpae, linux-image-4.15.0-115-generic
- USN-4414-1: linux-azure, linux-image-4.15.0-1046-oracle, linux-gke-4.15, linux-image-generic-lpae-hwe-16.04, linux-aws-hwe, linux-oracle, linux-azure-4.15, linux-image-generic-lpae-hwe-16.04-edge, linux-hwe, linux-image-4.15.0-1064-gke, linux-image-generic-hwe-16.04-edge, linux-image-virtual, linux-image-4.15.0-1078-gcp, linux-image-4.15.0-109-lowlatency, linux-image-4.15.0-107-generic-lpae, linux-image-lowlatency-hwe-16.04, linux-image-generic-hwe-16.04, linux-image-4.15.0-107-generic, linux-image-4.15.0-1069-kvm, linux-image-azure, linux-image-generic-lpae, linux-image-oem, linux-image-4.15.0-1081-snapdragon, linux-image-4.15.0-1091-oem, linux-gcp, linux, linux-image-4.15.0-1048-oracle, linux-image-4.15.0-109-generic-lpae, linux-image-aws-lts-18.04, linux-image-oracle-lts-18.04, linux-image-aws-hwe, linux-image-azure-edge, linux-image-gcp-lts-18.04, linux-image-raspi2, linux-image-virtual-hwe-16.04, linux-snapdragon, linux-image-4.15.0-1074-aws, linux-image-snapdragon, linux-image-virtual-hwe-16.04-edge, linux-image-gcp, linux-image-oracle, linux-image-4.15.0-1077-aws, linux-gcp-4.15, linux-image-4.15.0-107-lowlatency, linux-image-4.15.0-109-generic, linux-image-lowlatency, linux-kvm, linux-image-lowlatency-hwe-16.04-edge, linux-raspi2, linux-image-kvm, linux-image-gke-4.15, linux-image-azure-lts-18.04, linux-oem, linux-image-generic, linux-aws, linux-image-4.15.0-1065-raspi2, linux-image-gke, linux-image-4.15.0-1091-azure
- USN-4284-1: linux-azure, linux-oracle, linux-hwe, linux-image-virtual-hwe-18.04-edge, linux-image-virtual, linux-image-5.3.0-1010-kvm, linux-image-generic-lpae, linux-image-azure, linux-image-5.3.0-40-generic, linux-raspi2-5.3, linux-image-raspi2-hwe-18.04, linux-image-generic-lpae-hwe-18.04, linux-gcp, linux, linux-image-generic-hwe-18.04, linux-image-lowlatency-hwe-18.04-edge, linux-image-azure-edge, linux-image-generic-lpae-hwe-18.04-edge, linux-image-lowlatency-hwe-18.04, linux-image-raspi2, linux-image-snapdragon, linux-image-5.3.0-40-generic-lpae, linux-image-5.3.0-40-lowlatency, linux-image-gcp, linux-image-oracle, linux-azure-5.3, linux-gcp-5.3, linux-image-5.3.0-1011-aws, linux-image-virtual-hwe-18.04, linux-image-aws, linux-image-lowlatency, linux-kvm, linux-image-5.3.0-1013-azure, linux-raspi2, linux-image-kvm, linux-image-5.3.0-1012-gcp, linux-image-generic, linux-image-gcp-edge, linux-image-snapdragon-hwe-18.04-edge, linux-aws, linux-image-gke, linux-image-5.3.0-1009-oracle, linux-image-snapdragon-hwe-18.04, linux-image-generic-hwe-18.04-edge, linux-image-5.3.0-40-snapdragon, linux-image-5.3.0-1018-raspi2
- USN-4285-1: linux-aws-5.0, linux-azure, linux-image-5.0.0-1030-gke, linux-image-azure, linux-image-gcp, linux-image-gke-5.0, linux-image-5.0.0-1032-azure, linux-image-5.0.0-1031-gcp, linux-gcp, linux-oracle-5.0, linux-gke-5.0, linux-image-oracle-edge, linux-image-aws-edge, linux-image-5.0.0-1011-oracle, linux-image-5.0.0-1025-aws
- USN-4426-1: linux-azure, linux-image-4.15.0-1093-oem, linux-gke-4.15, linux-image-generic-lpae-hwe-16.04, linux-aws-hwe, linux-image-4.15.0-1050-oracle, linux-oracle, linux-azure-4.15, linux-image-4.15.0-1092-azure, linux-image-generic-lpae-hwe-16.04-edge, linux-hwe, linux-image-4.15.0-112-generic, linux-image-4.15.0-112-lowlatency, linux-image-generic-hwe-16.04-edge, linux-image-virtual, linux-image-4.15.0-1079-aws, linux-image-lowlatency-hwe-16.04, linux-image-oem, linux-image-generic-hwe-16.04, linux-image-generic-lpae, linux-image-azure, linux-gcp, linux, linux-image-aws-lts-18.04, linux-image-oracle-lts-18.04, linux-image-aws-hwe, linux-image-azure-edge, linux-image-gcp-lts-18.04, linux-image-raspi2, linux-image-virtual-hwe-16.04, linux-snapdragon, linux-image-4.15.0-1067-raspi2, linux-image-virtual-hwe-16.04-edge, linux-image-gcp, linux-image-oracle, linux-gcp-4.15, linux-image-4.15.0-112-generic-lpae, linux-image-4.15.0-1080-gcp, linux-image-4.15.0-1071-kvm, linux-image-lowlatency, linux-kvm, linux-image-lowlatency-hwe-16.04-edge, linux-image-4.15.0-1066-gke, linux-raspi2, linux-image-kvm, linux-image-gke-4.15, linux-image-azure-lts-18.04, linux-oem, linux-image-generic, linux-aws, linux-image-gke
- USN-4411-1: linux-azure, linux-image-5.4.0-1020-azure, linux-image-5.4.0-28-generic, linux-image-lowlatency-hwe-20.04, linux-oracle, linux-image-virtual-hwe-18.04-edge, linux-image-virtual, linux-image-oem, linux-riscv, linux-image-generic-lpae, linux-image-azure, linux-image-generic-hwe-20.04, linux-gcp, linux, linux-image-generic-hwe-18.04, linux-image-generic-lpae-hwe-18.04, linux-image-lowlatency-hwe-18.04-edge, linux-image-oem-osp1, linux-image-generic-lpae-hwe-18.04-edge, linux-image-lowlatency-hwe-18.04, linux-image-raspi2, linux-image-raspi, linux-image-5.4.0-1018-aws, linux-image-generic-lpae-hwe-20.04, linux-image-5.4.0-1019-oracle, linux-image-gcp, linux-image-oracle, linux-image-5.4.0-1013-raspi, linux-image-5.4.0-1019-gcp, linux-image-virtual-hwe-18.04, linux-image-aws, linux-image-lowlatency, linux-kvm, linux-image-5.4.0-40-generic-lpae, linux-raspi, linux-image-kvm, linux-image-5.4.0-40-generic, linux-image-virtual-hwe-20.04, linux-image-generic, linux-aws, linux-image-gke, linux-image-generic-hwe-18.04-edge, linux-image-5.4.0-40-lowlatency
- USN-4425-1: linux-image-5.4.0-1020-aws, linux-azure, linux-image-5.4.0-1021-oracle, linux-image-5.4.0-30-generic, linux-image-lowlatency-hwe-20.04, linux-oracle, linux-image-virtual-hwe-18.04-edge, linux-image-virtual, linux-image-oem, linux-riscv, linux-image-generic-lpae, linux-image-azure, linux-image-gkeop-5.4, linux-image-raspi2-hwe-18.04, linux-image-generic-hwe-20.04, linux-gcp, linux, linux-image-generic-hwe-18.04, linux-image-generic-lpae-hwe-18.04, linux-image-lowlatency-hwe-18.04-edge, linux-image-oem-osp1, linux-hwe-5.4, linux-image-azure-edge, linux-azure-5.4, linux-image-generic-lpae-hwe-18.04-edge, linux-image-lowlatency-hwe-18.04, linux-image-raspi, linux-image-generic-lpae-hwe-20.04, linux-image-raspi-hwe-18.04, linux-image-raspi2, linux-image-gcp, linux-image-5.4.0-1022-azure, linux-image-raspi-hwe-18.04-edge, linux-image-oracle, linux-raspi-5.4, linux-image-virtual-hwe-18.04, linux-image-aws, linux-image-lowlatency, linux-kvm, linux-raspi, linux-image-5.4.0-1021-gcp, linux-image-kvm, linux-image-virtual-hwe-20.04, linux-image-5.4.0-1015-raspi, linux-image-raspi2-hwe-18.04-edge, linux-image-5.4.0-42-generic-lpae, linux-image-generic, linux-image-snapdragon-hwe-18.04-edge, linux-aws, linux-image-gke, linux-image-snapdragon-hwe-18.04, linux-image-5.4.0-42-lowlatency, linux-image-generic-hwe-18.04-edge, linux-image-5.4.0-42-generic
- LSN-0070-1: aws, generic-4.15, lowlatency-4.4, azure, generic-4.4, lowlatency-4.15, gcp, oem, generic-5.4, lowlatency-5.4
- LSN-0072-1: aws, generic-4.15, lowlatency-4.4, azure, generic-4.4, lowlatency-4.15, gcp, oem, generic-5.4, lowlatency-5.4