First published: Tue Apr 28 2020(Updated: )
Al Viro discovered that the Linux kernel for s390x systems did not properly perform page table upgrades for kernel sections that use secondary address mode. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2020-11884) It was discovered that the Intel Wi-Fi driver in the Linux kernel did not properly check for errors in some situations. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2019-16234) Tristan Madani discovered that the block I/O tracing implementation in the Linux kernel contained a race condition. A local attacker could use this to cause a denial of service (system crash) or possibly expose sensitive information. (CVE-2019-19768) It was discovered that the vhost net driver in the Linux kernel contained a stack buffer overflow. A local attacker with the ability to perform ioctl() calls on /dev/vhost-net could use this to cause a denial of service (system crash). (CVE-2020-10942) It was discovered that the OV51x USB Camera device driver in the Linux kernel did not properly validate device metadata. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2020-11608) It was discovered that the STV06XX USB Camera device driver in the Linux kernel did not properly validate device metadata. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2020-11609) It was discovered that the Xirlink C-It USB Camera device driver in the Linux kernel did not properly validate device metadata. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2020-11668) It was discovered that the virtual terminal implementation in the Linux kernel contained a race condition. A local attacker could possibly use this to cause a denial of service (system crash) or expose sensitive information. (CVE-2020-8648) Jordy Zomer discovered that the floppy driver in the Linux kernel did not properly check for errors in some situations. A local attacker could possibly use this to cause a denial of service (system crash) or possibly expose sensitive information. (CVE-2020-9383)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-4.15.0-1038-oracle | <4.15.0-1038.42 | 4.15.0-1038.42 |
Ubuntu Linux | =18.04 | |
All of | ||
ubuntu/linux-image-4.15.0-1058-gke | <4.15.0-1058.61 | 4.15.0-1058.61 |
Ubuntu Linux | =18.04 | |
All of | ||
ubuntu/linux-image-4.15.0-1059-kvm | <4.15.0-1059.60 | 4.15.0-1059.60 |
Ubuntu Linux | =18.04 | |
All of | ||
ubuntu/linux-image-4.15.0-1061-raspi2 | <4.15.0-1061.65 | 4.15.0-1061.65 |
Ubuntu Linux | =18.04 | |
All of | ||
ubuntu/linux-image-4.15.0-1066-aws | <4.15.0-1066.70 | 4.15.0-1066.70 |
Ubuntu Linux | =18.04 | |
All of | ||
ubuntu/linux-image-4.15.0-1077-snapdragon | <4.15.0-1077.84 | 4.15.0-1077.84 |
Ubuntu Linux | =18.04 | |
All of | ||
ubuntu/linux-image-4.15.0-1080-oem | <4.15.0-1080.90 | 4.15.0-1080.90 |
Ubuntu Linux | =18.04 | |
All of | ||
ubuntu/linux-image-4.15.0-99-generic | <4.15.0-99.100 | 4.15.0-99.100 |
Ubuntu Linux | =18.04 | |
All of | ||
ubuntu/linux-image-4.15.0-99-generic-lpae | <4.15.0-99.100 | 4.15.0-99.100 |
Ubuntu Linux | =18.04 | |
All of | ||
ubuntu/linux-image-4.15.0-99-lowlatency | <4.15.0-99.100 | 4.15.0-99.100 |
Ubuntu Linux | =18.04 | |
All of | ||
ubuntu/linux-image-aws-lts-18.04 | <4.15.0.1066.69 | 4.15.0.1066.69 |
Ubuntu Linux | =18.04 | |
All of | ||
ubuntu/linux-image-generic | <4.15.0.99.89 | 4.15.0.99.89 |
Ubuntu Linux | =18.04 | |
All of | ||
ubuntu/linux-image-generic-lpae | <4.15.0.99.89 | 4.15.0.99.89 |
Ubuntu Linux | =18.04 | |
All of | ||
ubuntu/linux-image-gke | <4.15.0.1058.62 | 4.15.0.1058.62 |
Ubuntu Linux | =18.04 | |
All of | ||
ubuntu/linux-image-gke-4.15 | <4.15.0.1058.62 | 4.15.0.1058.62 |
Ubuntu Linux | =18.04 | |
All of | ||
ubuntu/linux-image-kvm | <4.15.0.1059.59 | 4.15.0.1059.59 |
Ubuntu Linux | =18.04 | |
All of | ||
ubuntu/linux-image-lowlatency | <4.15.0.99.89 | 4.15.0.99.89 |
Ubuntu Linux | =18.04 | |
All of | ||
ubuntu/linux-image-oem | <4.15.0.1080.84 | 4.15.0.1080.84 |
Ubuntu Linux | =18.04 | |
All of | ||
ubuntu/linux-image-oracle-lts-18.04 | <4.15.0.1038.47 | 4.15.0.1038.47 |
Ubuntu Linux | =18.04 | |
All of | ||
ubuntu/linux-image-raspi2 | <4.15.0.1061.59 | 4.15.0.1061.59 |
Ubuntu Linux | =18.04 | |
All of | ||
ubuntu/linux-image-snapdragon | <4.15.0.1077.80 | 4.15.0.1077.80 |
Ubuntu Linux | =18.04 | |
All of | ||
ubuntu/linux-image-virtual | <4.15.0.99.89 | 4.15.0.99.89 |
Ubuntu Linux | =18.04 | |
All of | ||
ubuntu/linux-image-4.15.0-1038-oracle | <4.15.0-1038.42~16.04.1 | 4.15.0-1038.42~16.04.1 |
Ubuntu Linux | =16.04 | |
All of | ||
ubuntu/linux-image-4.15.0-1061-gcp | <4.15.0-1061.65 | 4.15.0-1061.65 |
Ubuntu Linux | =16.04 | |
All of | ||
ubuntu/linux-image-4.15.0-1066-aws | <4.15.0-1066.70~16.04.1 | 4.15.0-1066.70~16.04.1 |
Ubuntu Linux | =16.04 | |
All of | ||
ubuntu/linux-image-4.15.0-1082-azure | <4.15.0-1082.92~16.04.1 | 4.15.0-1082.92~16.04.1 |
Ubuntu Linux | =16.04 | |
All of | ||
ubuntu/linux-image-4.15.0-99-generic | <4.15.0-99.100~16.04.1 | 4.15.0-99.100~16.04.1 |
Ubuntu Linux | =16.04 | |
All of | ||
ubuntu/linux-image-4.15.0-99-generic-lpae | <4.15.0-99.100~16.04.1 | 4.15.0-99.100~16.04.1 |
Ubuntu Linux | =16.04 | |
All of | ||
ubuntu/linux-image-4.15.0-99-lowlatency | <4.15.0-99.100~16.04.1 | 4.15.0-99.100~16.04.1 |
Ubuntu Linux | =16.04 | |
All of | ||
ubuntu/linux-image-aws-hwe | <4.15.0.1066.66 | 4.15.0.1066.66 |
Ubuntu Linux | =16.04 | |
All of | ||
ubuntu/linux-image-azure | <4.15.0.1082.81 | 4.15.0.1082.81 |
Ubuntu Linux | =16.04 | |
All of | ||
ubuntu/linux-image-azure-edge | <4.15.0.1082.81 | 4.15.0.1082.81 |
Ubuntu Linux | =16.04 | |
All of | ||
ubuntu/linux-image-gcp | <4.15.0.1061.75 | 4.15.0.1061.75 |
Ubuntu Linux | =16.04 | |
All of | ||
ubuntu/linux-image-generic-hwe-16.04 | <4.15.0.99.106 | 4.15.0.99.106 |
Ubuntu Linux | =16.04 | |
All of | ||
ubuntu/linux-image-generic-lpae-hwe-16.04 | <4.15.0.99.106 | 4.15.0.99.106 |
Ubuntu Linux | =16.04 | |
All of | ||
ubuntu/linux-image-gke | <4.15.0.1061.75 | 4.15.0.1061.75 |
Ubuntu Linux | =16.04 | |
All of | ||
ubuntu/linux-image-lowlatency-hwe-16.04 | <4.15.0.99.106 | 4.15.0.99.106 |
Ubuntu Linux | =16.04 | |
All of | ||
ubuntu/linux-image-oem | <4.15.0.99.106 | 4.15.0.99.106 |
Ubuntu Linux | =16.04 | |
All of | ||
ubuntu/linux-image-oracle | <4.15.0.1038.31 | 4.15.0.1038.31 |
Ubuntu Linux | =16.04 | |
All of | ||
ubuntu/linux-image-virtual-hwe-16.04 | <4.15.0.99.106 | 4.15.0.99.106 |
Ubuntu Linux | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
USN-4345-1 is classified as a critical severity vulnerability due to its potential to cause system crashes or arbitrary code execution.
To fix USN-4345-1, you should upgrade the affected Linux kernel packages to the latest versions provided in the Ubuntu security updates.
USN-4345-1 affects the Linux kernel on Ubuntu 18.04 systems specifically for s390x architecture.
A local attacker can exploit USN-4345-1 to perform a denial of service attack or execute arbitrary code.
USN-4345-1 impacts the page table upgrades for kernel sections that utilize secondary address mode in the Linux kernel.