All Vulnerability Reports

USN-4345-1: Linux kernel vulnerabilities


Severity

High

Vendor

Canonical Ubuntu

Versions Affected

  • Canonical Ubuntu 16.04

Description

Al Viro discovered that the Linux kernel for s390x systems did not properly perform page table upgrades for kernel sections that use secondary address mode. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2020-11884)

It was discovered that the Intel Wi-Fi driver in the Linux kernel did not properly check for errors in some situations. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2019-16234)

Tristan Madani discovered that the block I/O tracing implementation in the Linux kernel contained a race condition. A local attacker could use this to cause a denial of service (system crash) or possibly expose sensitive information. (CVE-2019-19768)

It was discovered that the vhost net driver in the Linux kernel contained a stack buffer overflow. A local attacker with the ability to perform ioctl() calls on /dev/vhost-net could use this to cause a denial of service (system crash). (CVE-2020-10942)

It was discovered that the OV51x USB Camera device driver in the Linux kernel did not properly validate device metadata. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2020-11608)

It was discovered that the STV06XX USB Camera device driver in the Linux kernel did not properly validate device metadata. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2020-11609)

It was discovered that the Xirlink C-It USB Camera device driver in the Linux kernel did not properly validate device metadata. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2020-11668)

It was discovered that the virtual terminal implementation in the Linux kernel contained a race condition. A local attacker could possibly use this to cause a denial of service (system crash) or expose sensitive information. (CVE-2020-8648)

Jordy Zomer discovered that the floppy driver in the Linux kernel did not properly check for errors in some situations. A local attacker could possibly use this to cause a denial of service (system crash) or possibly expose sensitive information. (CVE-2020-9383)

CVEs contained in this USN include: CVE-2019-16234, CVE-2019-19768, CVE-2020-8648, CVE-2020-9383, CVE-2020-10942, CVE-2020-11608, CVE-2020-11609, CVE-2020-11668, CVE-2020-11884

Affected VMware Products and Versions

Severity is high unless otherwise noted.

Vulnerable Cloud Foundry components individually listed here.

Impacted stemcells may be updated independently of upgrading Pivotal Application Service or PCF Isolation Segment.

  • Isolation Segment
    • 2.6.x versions prior to 2.6.20
    • 2.7.x versions prior to 2.7.15
    • 2.8.x versions prior to 2.8.9
    • 2.9.x versions prior to 2.9.3
  • Operations Manager
    • 2.7 versions prior to 2.7.17
    • 2.8 versions prior to 2.8.8
  • VMware Tanzu Application Service for VMs
    • 2.6.x versions prior to 2.6.21
    • 2.7.x versions prior to 2.7.15
    • 2.8.x versions prior to 2.8.9
    • 2.9.x versions prior to 2.9.3

Mitigation

Users of affected products are strongly encouraged to follow the mitigation below. The Cloud Foundry security team recommends upgrading the affected OSS components listed here if applicable. Upgrade Pivotal products that use earlier versions of CF components to new Pivotal releases using new versions linked above. On the Pivotal Network product page for each release, check the Depends On section and/or Release Notes for this information. Releases that have fixed this issue include:

  • Isolation Segment
    • 2.6.20
    • 2.7.15
    • 2.8.9
    • 2.9.3
  • Operations Manager
    • 2.7.17
    • 2.8.8
  • VMware Tanzu Application Service for VMs
    • 2.6.21
    • 2.7.15
    • 2.8.9
    • 2.9.3

References

History

2020-04-28: Initial vulnerability report published.