{"id":"USN-4439-1","summary":"linux-gke-5.0, linux-oem-osp1 vulnerabilities","details":"It was discovered that the network block device (nbd) implementation in the\nLinux kernel did not properly check for error conditions in some\nsituations. An attacker could possibly use this to cause a denial of\nservice (system crash). (CVE-2019-16089)\n\nIt was discovered that the btrfs file system implementation in the Linux\nkernel did not properly validate file system metadata in some situations.\nAn attacker could use this to construct a malicious btrfs image that, when\nmounted, could cause a denial of service (system crash). (CVE-2019-19036)\n\nIt was discovered that the kernel-\u003euser space relay implementation in the\nLinux kernel did not properly check return values in some situations. A\nlocal attacker could possibly use this to cause a denial of service (system\ncrash). (CVE-2019-19462)\n\nChuhong Yuan discovered that go7007 USB audio device driver in the Linux\nkernel did not properly deallocate memory in some failure conditions. A\nphysically proximate attacker could use this to cause a denial of service\n(memory exhaustion). (CVE-2019-20810)\n\nIt was discovered that the elf handling code in the Linux kernel did not\ninitialize memory before using it in certain situations. A local attacker\ncould use this to possibly expose sensitive information (kernel memory).\n(CVE-2020-10732)\n\nFan Yang discovered that the mremap implementation in the Linux kernel did\nnot properly handle DAX Huge Pages. A local attacker with access to DAX\nstorage could use this to gain administrative privileges. (CVE-2020-10757)\n\nIt was discovered that the Linux kernel did not correctly apply Speculative\nStore Bypass Disable (SSBD) mitigations in certain situations. A local\nattacker could possibly use this to expose sensitive information.\n(CVE-2020-10766)\n\nIt was discovered that the Linux kernel did not correctly apply Indirect\nBranch Predictor Barrier (IBPB) mitigations in certain situations. A local\nattacker could possibly use this to expose sensitive information.\n(CVE-2020-10767)\n\nIt was discovered that the Linux kernel could incorrectly enable Indirect\nBranch Speculation after it has been disabled for a process via a prctl()\ncall. A local attacker could possibly use this to expose sensitive\ninformation. (CVE-2020-10768)\n\nMauricio Faria de Oliveira discovered that the aufs implementation in the\nLinux kernel improperly managed inode reference counts in the\nvfsub_dentry_open() method. A local attacker could use this vulnerability\nto cause a denial of service. (CVE-2020-11935)\n\nIt was discovered that the Virtual Terminal keyboard driver in the Linux\nkernel contained an integer overflow. A local attacker could possibly use\nthis to have an unspecified impact. (CVE-2020-13974)\n\nIt was discovered that the efi subsystem in the Linux kernel did not handle\nmemory allocation failures during early boot in some situations. A local\nattacker could possibly use this to cause a denial of service (system\ncrash). (CVE-2019-12380)\n\nJason A. Donenfeld discovered that the ACPI implementation in the Linux\nkernel did not properly restrict loading SSDT code from an EFI variable.\nA privileged attacker could use this to bypass Secure Boot lockdown\nrestrictions and execute arbitrary code in the kernel. (CVE-2019-20908)\n\nJason A. Donenfeld discovered that the ACPI implementation in the Linux\nkernel did not properly restrict loading ACPI tables via configfs. A\nprivileged attacker could use this to bypass Secure Boot lockdown\nrestrictions and execute arbitrary code in the kernel. (CVE-2020-15780)\n","modified":"2026-02-10T04:41:53Z","published":"2020-07-27T22:38:27Z","related":["UBUNTU-CVE-2019-12380","UBUNTU-CVE-2019-16089","UBUNTU-CVE-2019-19036","UBUNTU-CVE-2019-19462","UBUNTU-CVE-2019-20810","UBUNTU-CVE-2019-20908","UBUNTU-CVE-2020-10732","UBUNTU-CVE-2020-10757","UBUNTU-CVE-2020-10766","UBUNTU-CVE-2020-10767","UBUNTU-CVE-2020-10768","UBUNTU-CVE-2020-11935","UBUNTU-CVE-2020-13974","UBUNTU-CVE-2020-15780"],"upstream":["CVE-2019-12380","CVE-2019-16089","CVE-2019-19036","CVE-2019-19462","CVE-2019-20810","CVE-2019-20908","CVE-2020-10732","CVE-2020-10757","CVE-2020-10766","CVE-2020-10767","CVE-2020-10768","CVE-2020-11935","CVE-2020-13974","CVE-2020-15780","UBUNTU-CVE-2019-12380","UBUNTU-CVE-2019-16089","UBUNTU-CVE-2019-19036","UBUNTU-CVE-2019-19462","UBUNTU-CVE-2019-20810","UBUNTU-CVE-2019-20908","UBUNTU-CVE-2020-10732","UBUNTU-CVE-2020-10757","UBUNTU-CVE-2020-10766","UBUNTU-CVE-2020-10767","UBUNTU-CVE-2020-10768","UBUNTU-CVE-2020-11935","UBUNTU-CVE-2020-13974","UBUNTU-CVE-2020-15780"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-4439-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-12380"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-16089"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-19036"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-19462"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-20810"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-20908"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-10732"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-10757"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-10766"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-10767"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-10768"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-11935"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-13974"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-15780"}],"affected":[{"package":{"name":"linux-gke-5.0","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/linux-gke-5.0@5.0.0-1045.46?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.0.0-1045.46"}]}],"versions":["5.0.0-1011.11~18.04.1","5.0.0-1013.13~18.04.1","5.0.0-1015.15~18.04.1","5.0.0-1017.17~18.04.1","5.0.0-1020.20~18.04.1","5.0.0-1022.22~18.04.3","5.0.0-1023.23~18.04.2","5.0.0-1025.26~18.04.1","5.0.0-1026.27~18.04.2","5.0.0-1027.28~18.04.1","5.0.0-1029.30~18.04.1","5.0.0-1030.31","5.0.0-1032.33","5.0.0-1033.34","5.0.0-1035.36","5.0.0-1037.38","5.0.0-1042.43","5.0.0-1043.44"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"5.0.0-1045.46","binary_name":"linux-buildinfo-5.0.0-1045-gke"},{"binary_version":"5.0.0-1045.46","binary_name":"linux-gke-5.0-headers-5.0.0-1045"},{"binary_version":"5.0.0-1045.46","binary_name":"linux-gke-5.0-tools-5.0.0-1045"},{"binary_version":"5.0.0-1045.46","binary_name":"linux-headers-5.0.0-1045-gke"},{"binary_version":"5.0.0-1045.46","binary_name":"linux-image-unsigned-5.0.0-1045-gke"},{"binary_version":"5.0.0-1045.46","binary_name":"linux-modules-5.0.0-1045-gke"},{"binary_version":"5.0.0-1045.46","binary_name":"linux-modules-extra-5.0.0-1045-gke"},{"binary_version":"5.0.0-1045.46","binary_name":"linux-tools-5.0.0-1045-gke"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:18.04:LTS","cves":[{"severity":[{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"negligible","type":"Ubuntu"}],"id":"CVE-2019-12380"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2019-16089"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2019-19036"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2019-19462"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2019-20810"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2019-20908"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2020-10732"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2020-10757"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2020-10766"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2020-10767"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2020-10768"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2020-11935"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2020-13974"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2020-15780"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4439-1.json"}},{"package":{"name":"linux-oem-osp1","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/linux-oem-osp1@5.0.0-1065.70?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.0.0-1065.70"}]}],"versions":["5.0.0-1010.11","5.0.0-1012.13","5.0.0-1015.16","5.0.0-1018.20","5.0.0-1020.22","5.0.0-1022.24","5.0.0-1024.27","5.0.0-1025.28","5.0.0-1027.31","5.0.0-1028.32","5.0.0-1030.34","5.0.0-1033.38","5.0.0-1037.42","5.0.0-1039.44","5.0.0-1040.45","5.0.0-1043.48","5.0.0-1046.51","5.0.0-1047.52","5.0.0-1050.55","5.0.0-1052.57","5.0.0-1059.64","5.0.0-1062.67","5.0.0-1063.68"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"5.0.0-1065.70","binary_name":"block-modules-5.0.0-1065-oem-osp1-di"},{"binary_version":"5.0.0-1065.70","binary_name":"crypto-modules-5.0.0-1065-oem-osp1-di"},{"binary_version":"5.0.0-1065.70","binary_name":"fat-modules-5.0.0-1065-oem-osp1-di"},{"binary_version":"5.0.0-1065.70","binary_name":"fb-modules-5.0.0-1065-oem-osp1-di"},{"binary_version":"5.0.0-1065.70","binary_name":"firewire-core-modules-5.0.0-1065-oem-osp1-di"},{"binary_version":"5.0.0-1065.70","binary_name":"floppy-modules-5.0.0-1065-oem-osp1-di"},{"binary_version":"5.0.0-1065.70","binary_name":"fs-core-modules-5.0.0-1065-oem-osp1-di"},{"binary_version":"5.0.0-1065.70","binary_name":"fs-secondary-modules-5.0.0-1065-oem-osp1-di"},{"binary_version":"5.0.0-1065.70","binary_name":"input-modules-5.0.0-1065-oem-osp1-di"},{"binary_version":"5.0.0-1065.70","binary_name":"ipmi-modules-5.0.0-1065-oem-osp1-di"},{"binary_version":"5.0.0-1065.70","binary_name":"kernel-image-5.0.0-1065-oem-osp1-di"},{"binary_version":"5.0.0-1065.70","binary_name":"linux-buildinfo-5.0.0-1065-oem-osp1"},{"binary_version":"5.0.0-1065.70","binary_name":"linux-headers-5.0.0-1065-oem-osp1"},{"binary_version":"5.0.0-1065.70","binary_name":"linux-image-unsigned-5.0.0-1065-oem-osp1"},{"binary_version":"5.0.0-1065.70","binary_name":"linux-modules-5.0.0-1065-oem-osp1"},{"binary_version":"5.0.0-1065.70","binary_name":"linux-oem-osp1-headers-5.0.0-1065"},{"binary_version":"5.0.0-1065.70","binary_name":"linux-oem-osp1-tools-5.0.0-1065"},{"binary_version":"5.0.0-1065.70","binary_name":"linux-oem-osp1-tools-host"},{"binary_version":"5.0.0-1065.70","binary_name":"linux-tools-5.0.0-1065-oem-osp1"},{"binary_version":"5.0.0-1065.70","binary_name":"linux-udebs-oem-osp1"},{"binary_version":"5.0.0-1065.70","binary_name":"md-modules-5.0.0-1065-oem-osp1-di"},{"binary_version":"5.0.0-1065.70","binary_name":"message-modules-5.0.0-1065-oem-osp1-di"},{"binary_version":"5.0.0-1065.70","binary_name":"mouse-modules-5.0.0-1065-oem-osp1-di"},{"binary_version":"5.0.0-1065.70","binary_name":"multipath-modules-5.0.0-1065-oem-osp1-di"},{"binary_version":"5.0.0-1065.70","binary_name":"nfs-modules-5.0.0-1065-oem-osp1-di"},{"binary_version":"5.0.0-1065.70","binary_name":"nic-modules-5.0.0-1065-oem-osp1-di"},{"binary_version":"5.0.0-1065.70","binary_name":"nic-pcmcia-modules-5.0.0-1065-oem-osp1-di"},{"binary_version":"5.0.0-1065.70","binary_name":"nic-shared-modules-5.0.0-1065-oem-osp1-di"},{"binary_version":"5.0.0-1065.70","binary_name":"nic-usb-modules-5.0.0-1065-oem-osp1-di"},{"binary_version":"5.0.0-1065.70","binary_name":"parport-modules-5.0.0-1065-oem-osp1-di"},{"binary_version":"5.0.0-1065.70","binary_name":"pata-modules-5.0.0-1065-oem-osp1-di"},{"binary_version":"5.0.0-1065.70","binary_name":"pcmcia-modules-5.0.0-1065-oem-osp1-di"},{"binary_version":"5.0.0-1065.70","binary_name":"pcmcia-storage-modules-5.0.0-1065-oem-osp1-di"},{"binary_version":"5.0.0-1065.70","binary_name":"plip-modules-5.0.0-1065-oem-osp1-di"},{"binary_version":"5.0.0-1065.70","binary_name":"ppp-modules-5.0.0-1065-oem-osp1-di"},{"binary_version":"5.0.0-1065.70","binary_name":"sata-modules-5.0.0-1065-oem-osp1-di"},{"binary_version":"5.0.0-1065.70","binary_name":"scsi-modules-5.0.0-1065-oem-osp1-di"},{"binary_version":"5.0.0-1065.70","binary_name":"serial-modules-5.0.0-1065-oem-osp1-di"},{"binary_version":"5.0.0-1065.70","binary_name":"storage-core-modules-5.0.0-1065-oem-osp1-di"},{"binary_version":"5.0.0-1065.70","binary_name":"usb-modules-5.0.0-1065-oem-osp1-di"},{"binary_version":"5.0.0-1065.70","binary_name":"virtio-modules-5.0.0-1065-oem-osp1-di"},{"binary_version":"5.0.0-1065.70","binary_name":"vlan-modules-5.0.0-1065-oem-osp1-di"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:18.04:LTS","cves":[{"severity":[{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"negligible","type":"Ubuntu"}],"id":"CVE-2019-12380"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2019-16089"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2019-19036"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2019-19462"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2019-20810"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2019-20908"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2020-10732"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2020-10757"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2020-10766"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2020-10767"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2020-10768"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2020-11935"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2020-13974"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2020-15780"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4439-1.json"}}],"schema_version":"1.7.3"}