{"id":38367,"date":"2020-09-02T09:57:48","date_gmt":"2020-09-02T00:57:48","guid":{"rendered":"https:\/\/jirak.net\/wp\/usn-4483-1-linux-kernel-vulnerabilities\/"},"modified":"2020-09-02T13:34:05","modified_gmt":"2020-09-02T04:34:05","slug":"usn-4483-1-linux-kernel-vulnerabilities","status":"publish","type":"post","link":"https:\/\/jirak.net\/wp\/usn-4483-1-linux-kernel-vulnerabilities\/","title":{"rendered":"USN-4483-1: Linux kernel vulnerabilities"},"content":{"rendered":"<p>USN-4483-1: Linux kernel vulnerabilities<\/p>\n<p>Chuhong Yuan discovered that go7007 USB audio device driver in the Linux<br \/>\nkernel did not properly deallocate memory in some failure conditions. A<br \/>\nphysically proximate attacker could use this to cause a denial of service<br \/>\n(memory exhaustion). (CVE-2019-20810)<\/p>\n<p>Fan Yang discovered that the mremap implementation in the Linux kernel did<br \/>\nnot properly handle DAX Huge Pages. A local attacker with access to DAX<br \/>\nstorage could use this to gain administrative privileges. (CVE-2020-10757)<\/p>\n<p>It was discovered that the Linux kernel did not correctly apply Speculative<br \/>\nStore Bypass Disable (SSBD) mitigations in certain situations. A local<br \/>\nattacker could possibly use this to expose sensitive information.<br \/>\n(CVE-2020-10766)<\/p>\n<p>It was discovered that the Linux kernel did not correctly apply Indirect<br \/>\nBranch Predictor Barrier (IBPB) mitigations in certain situations. A local<br \/>\nattacker could possibly use this to expose sensitive information.<br \/>\n(CVE-2020-10767)<\/p>\n<p>It was discovered that the Linux kernel could incorrectly enable Indirect<br \/>\nBranch Speculation after it has been disabled for a process via a prctl()<br \/>\ncall. A local attacker could possibly use this to expose sensitive<br \/>\ninformation. (CVE-2020-10768)<\/p>\n<p>Luca Bruno discovered that the zram module in the Linux kernel did not<br \/>\nproperly restrict unprivileged users from accessing the hot_add sysfs file.<br \/>\nA local attacker could use this to cause a denial of service (memory<br \/>\nexhaustion). (CVE-2020-10781)<\/p>\n<p>It was discovered that the XFS file system implementation in the Linux<br \/>\nkernel did not properly validate meta data in some circumstances. An<br \/>\nattacker could use this to construct a malicious XFS image that, when<br \/>\nmounted, could cause a denial of service. (CVE-2020-12655)<\/p>\n<p>It was discovered that the bcache subsystem in the Linux kernel did not<br \/>\nproperly release a lock in some error conditions. A local attacker could<br \/>\npossibly use this to cause a denial of service. (CVE-2020-12771)<\/p>\n<p>It was discovered that the Virtual Terminal keyboard driver in the Linux<br \/>\nkernel contained an integer overflow. A local attacker could possibly use<br \/>\nthis to have an unspecified impact. (CVE-2020-13974)<\/p>\n<p>It was discovered that the cgroup v2 subsystem in the Linux kernel did not<br \/>\nproperly perform reference counting in some situations, leading to a NULL<br \/>\npointer dereference. A local attacker could use this to cause a denial of<br \/>\nservice or possibly gain administrative privileges. (CVE-2020-14356)<\/p>\n<p>Kyungtae Kim discovered that the USB testing driver in the Linux kernel did<br \/>\nnot properly deallocate memory on disconnect events. A physically proximate<br \/>\nattacker could use this to cause a denial of service (memory exhaustion).<br \/>\n(CVE-2020-15393)<\/p>\n<p>It was discovered that the NFS server implementation in the Linux kernel<br \/>\ndid not properly honor umask settings when setting permissions while<br \/>\ncreating file system objects if the underlying file system did not support<br \/>\nACLs. An attacker could possibly use this to expose sensitive information<br \/>\nor violate system integrity. (CVE-2020-24394)<\/p>\n<p>It was discovered that the Kerberos SUNRPC GSS implementation in the Linux<br \/>\nkernel did not properly deallocate memory on module unload. A local<br \/>\nprivileged attacker could possibly use this to cause a denial of service<br \/>\n(memory exhaustion). (CVE-2020-12656)<br \/>\nSource: <a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-4483-1\" target=\"_blank\" rel=\"noopener noreferrer\">USN-4483-1: Linux kernel vulnerabilities<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>USN-4483-1: Linux kernel vulnerabilities Chuhong Yuan discovered that go7007 USB audio device driver in the Linux kernel did not properly deallocate memory in some failure conditions. A physically proximate attacker could use this to cause a denial of service (memory exhaustion). (CVE-2019-20810) Fan Yang discovered that the mremap implementation in the Linux kernel did not properly handle DAX Huge Pages. A local attacker with access to DAX storage could use this to gain administrative privileges. (CVE-2020-10757) It was discovered that the Linux kernel did not correctly apply Speculative Store Bypass Disable (SSBD) mitigations in certain situations. A local attacker could possibly use this to expose sensitive information. (CVE-2020-10766) It was discovered that the Linux kernel did not correctly apply Indirect Branch Predictor Barrier (IBPB) mitigations in certain situations. A local attacker could possibly use this to expose sensitive information. (CVE-2020-10767) <a class=\"mh-excerpt-more\" href=\"https:\/\/jirak.net\/wp\/usn-4483-1-linux-kernel-vulnerabilities\/\" title=\"USN-4483-1: Linux kernel vulnerabilities\">[ more&#8230; ]<\/a><\/p>\n<\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[586],"tags":[587],"class_list":["post-38367","post","type-post","status-publish","format-standard","hentry","category-ubuntu-usn","tag-ubuntu-usn"],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/38367","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/comments?post=38367"}],"version-history":[{"count":1,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/38367\/revisions"}],"predecessor-version":[{"id":38368,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/38367\/revisions\/38368"}],"wp:attachment":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/media?parent=38367"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/categories?post=38367"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/tags?post=38367"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}