Ubuntu update for linux



| Updated: 2025-04-23
Risk Medium
Patch available YES
Number of vulnerabilities 4
CVE-ID CVE-2020-10732
CVE-2020-10711
CVE-2020-12770
CVE-2020-13143
CWE-ID CWE-908
CWE-476
CWE-20
CWE-125
Exploitation vector Network
Public exploit N/A
Vulnerable software
Ubuntu
Operating systems & Components / Operating system

linux-image-virtual (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-raspi2 (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-raspi (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-oracle (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-oem-osp1 (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-oem (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-lowlatency (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-kvm (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-gke (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-generic-lpae (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-generic (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-gcp (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-azure (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-aws (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-5.4.0-40-generic-lpae (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-5.4.0-1020-azure (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-5.4.0-1019-oracle (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-5.4.0-1019-gcp (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-5.4.0-1018-aws (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-5.4.0-1013-raspi (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-5.4.0-40-lowlatency (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-5.4.0-40-generic (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-5.4.0-28-generic (Ubuntu package)
Operating systems & Components / Operating system package or component

Vendor Canonical Ltd.

Security Bulletin

This security bulletin contains information about 4 vulnerabilities.

1) Use of uninitialized resource

EUVDB-ID: #VU92424

Risk: Low

CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2020-10732

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: No

Description

The vulnerability allows a local user to read memory contents or crash the application.

The vulnerability exists due to use of uninitialized resource error within the fill_thread_core_info() function in fs/binfmt_elf.c. A local user can read memory contents or crash the application.

Mitigation

Update the affected package linux to the latest version.

Vulnerable software versions

Ubuntu: 20.04

linux-image-virtual (Ubuntu package): before 5.4.0.40.43

linux-image-raspi2 (Ubuntu package): before 5.4.0.1013.13

linux-image-raspi (Ubuntu package): before 5.4.0.1013.13

linux-image-oracle (Ubuntu package): before 5.4.0.1019.17

linux-image-oem-osp1 (Ubuntu package): before 5.4.0.40.43

linux-image-oem (Ubuntu package): before 5.4.0.40.43

linux-image-lowlatency (Ubuntu package): before 5.4.0.40.43

linux-image-kvm (Ubuntu package): before 5.4.0.1018.17

linux-image-gke (Ubuntu package): before 5.4.0.1019.17

linux-image-generic-lpae (Ubuntu package): before 5.4.0.40.43

linux-image-generic (Ubuntu package): before 5.4.0.40.43

linux-image-gcp (Ubuntu package): before 5.4.0.1019.17

linux-image-azure (Ubuntu package): before 5.4.0.1020.19

linux-image-aws (Ubuntu package): before 5.4.0.1018.19

linux-image-5.4.0-40-generic-lpae (Ubuntu package): before 5.4.0-40.44~18.04.1

linux-image-5.4.0-1020-azure (Ubuntu package): before 5.4.0-1020.20~18.04.1

linux-image-5.4.0-1019-oracle (Ubuntu package): before 5.4.0-1019.19~18.04.1

linux-image-5.4.0-1019-gcp (Ubuntu package): before 5.4.0-1019.19~18.04.2

linux-image-5.4.0-1018-aws (Ubuntu package): before 5.4.0-1018.18~18.04.1

linux-image-5.4.0-1013-raspi (Ubuntu package): before 5.4.0-1013.13~18.04.1

linux-image-5.4.0-40-lowlatency (Ubuntu package): before 5.4.0-40.44~18.04.1

linux-image-5.4.0-40-generic (Ubuntu package): before 5.4.0-40.44~18.04.1

linux-image-5.4.0-28-generic (Ubuntu package): before 5.4.0-28.32

CPE2.3 External links

https://ubuntu.com/security/notices/USN-4411-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) NULL pointer dereference

EUVDB-ID: #VU28180

Risk: Medium

CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2020-10711

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error in the Linux kernel's SELinux subsystem when importing the Commercial IP Security Option (CIPSO) protocol's category bitmap into the SELinux extensible bitmap via the' ebitmap_netlbl_import' routine. While processing the CIPSO restricted bitmap tag in the 'cipso_v4_parsetag_rbm' routine, it sets the security attribute to indicate that the category bitmap is present, even if it has not been allocated.

A remote attacker can send specially crafted packets the affected system, trigger a NULL pointer dereference error and crash the Linux kernel.

Mitigation

Update the affected package linux to the latest version.

Vulnerable software versions

Ubuntu: 20.04

linux-image-virtual (Ubuntu package): before 5.4.0.40.43

linux-image-raspi2 (Ubuntu package): before 5.4.0.1013.13

linux-image-raspi (Ubuntu package): before 5.4.0.1013.13

linux-image-oracle (Ubuntu package): before 5.4.0.1019.17

linux-image-oem-osp1 (Ubuntu package): before 5.4.0.40.43

linux-image-oem (Ubuntu package): before 5.4.0.40.43

linux-image-lowlatency (Ubuntu package): before 5.4.0.40.43

linux-image-kvm (Ubuntu package): before 5.4.0.1018.17

linux-image-gke (Ubuntu package): before 5.4.0.1019.17

linux-image-generic-lpae (Ubuntu package): before 5.4.0.40.43

linux-image-generic (Ubuntu package): before 5.4.0.40.43

linux-image-gcp (Ubuntu package): before 5.4.0.1019.17

linux-image-azure (Ubuntu package): before 5.4.0.1020.19

linux-image-aws (Ubuntu package): before 5.4.0.1018.19

linux-image-5.4.0-40-generic-lpae (Ubuntu package): before 5.4.0-40.44~18.04.1

linux-image-5.4.0-1020-azure (Ubuntu package): before 5.4.0-1020.20~18.04.1

linux-image-5.4.0-1019-oracle (Ubuntu package): before 5.4.0-1019.19~18.04.1

linux-image-5.4.0-1019-gcp (Ubuntu package): before 5.4.0-1019.19~18.04.2

linux-image-5.4.0-1018-aws (Ubuntu package): before 5.4.0-1018.18~18.04.1

linux-image-5.4.0-1013-raspi (Ubuntu package): before 5.4.0-1013.13~18.04.1

linux-image-5.4.0-40-lowlatency (Ubuntu package): before 5.4.0-40.44~18.04.1

linux-image-5.4.0-40-generic (Ubuntu package): before 5.4.0-40.44~18.04.1

linux-image-5.4.0-28-generic (Ubuntu package): before 5.4.0-28.32

CPE2.3 External links

https://ubuntu.com/security/notices/USN-4411-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Input validation error

EUVDB-ID: #VU28170

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2020-12770

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code on the system.

The vulnerability exists due to the "sg_write" lacks an "sg_remove_request" call in a certain failure case. A local user can pass specially crafted input to the application and execute arbitrary code on the target system.

Mitigation

Update the affected package linux to the latest version.

Vulnerable software versions

Ubuntu: 20.04

linux-image-virtual (Ubuntu package): before 5.4.0.40.43

linux-image-raspi2 (Ubuntu package): before 5.4.0.1013.13

linux-image-raspi (Ubuntu package): before 5.4.0.1013.13

linux-image-oracle (Ubuntu package): before 5.4.0.1019.17

linux-image-oem-osp1 (Ubuntu package): before 5.4.0.40.43

linux-image-oem (Ubuntu package): before 5.4.0.40.43

linux-image-lowlatency (Ubuntu package): before 5.4.0.40.43

linux-image-kvm (Ubuntu package): before 5.4.0.1018.17

linux-image-gke (Ubuntu package): before 5.4.0.1019.17

linux-image-generic-lpae (Ubuntu package): before 5.4.0.40.43

linux-image-generic (Ubuntu package): before 5.4.0.40.43

linux-image-gcp (Ubuntu package): before 5.4.0.1019.17

linux-image-azure (Ubuntu package): before 5.4.0.1020.19

linux-image-aws (Ubuntu package): before 5.4.0.1018.19

linux-image-5.4.0-40-generic-lpae (Ubuntu package): before 5.4.0-40.44~18.04.1

linux-image-5.4.0-1020-azure (Ubuntu package): before 5.4.0-1020.20~18.04.1

linux-image-5.4.0-1019-oracle (Ubuntu package): before 5.4.0-1019.19~18.04.1

linux-image-5.4.0-1019-gcp (Ubuntu package): before 5.4.0-1019.19~18.04.2

linux-image-5.4.0-1018-aws (Ubuntu package): before 5.4.0-1018.18~18.04.1

linux-image-5.4.0-1013-raspi (Ubuntu package): before 5.4.0-1013.13~18.04.1

linux-image-5.4.0-40-lowlatency (Ubuntu package): before 5.4.0-40.44~18.04.1

linux-image-5.4.0-40-generic (Ubuntu package): before 5.4.0-40.44~18.04.1

linux-image-5.4.0-28-generic (Ubuntu package): before 5.4.0-28.32

CPE2.3 External links

https://ubuntu.com/security/notices/USN-4411-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Out-of-bounds read

EUVDB-ID: #VU28157

Risk: Medium

CVSSv4.0: 4.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2020-13143

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary condition in "gadget_dev_desc_UDC_store" in "drivers/usb/gadget/configfs.c" file. A remote attacker can trigger out-of-bounds read error and cause a denial of service on the target system.

Mitigation

Update the affected package linux to the latest version.

Vulnerable software versions

Ubuntu: 20.04

linux-image-virtual (Ubuntu package): before 5.4.0.40.43

linux-image-raspi2 (Ubuntu package): before 5.4.0.1013.13

linux-image-raspi (Ubuntu package): before 5.4.0.1013.13

linux-image-oracle (Ubuntu package): before 5.4.0.1019.17

linux-image-oem-osp1 (Ubuntu package): before 5.4.0.40.43

linux-image-oem (Ubuntu package): before 5.4.0.40.43

linux-image-lowlatency (Ubuntu package): before 5.4.0.40.43

linux-image-kvm (Ubuntu package): before 5.4.0.1018.17

linux-image-gke (Ubuntu package): before 5.4.0.1019.17

linux-image-generic-lpae (Ubuntu package): before 5.4.0.40.43

linux-image-generic (Ubuntu package): before 5.4.0.40.43

linux-image-gcp (Ubuntu package): before 5.4.0.1019.17

linux-image-azure (Ubuntu package): before 5.4.0.1020.19

linux-image-aws (Ubuntu package): before 5.4.0.1018.19

linux-image-5.4.0-40-generic-lpae (Ubuntu package): before 5.4.0-40.44~18.04.1

linux-image-5.4.0-1020-azure (Ubuntu package): before 5.4.0-1020.20~18.04.1

linux-image-5.4.0-1019-oracle (Ubuntu package): before 5.4.0-1019.19~18.04.1

linux-image-5.4.0-1019-gcp (Ubuntu package): before 5.4.0-1019.19~18.04.2

linux-image-5.4.0-1018-aws (Ubuntu package): before 5.4.0-1018.18~18.04.1

linux-image-5.4.0-1013-raspi (Ubuntu package): before 5.4.0-1013.13~18.04.1

linux-image-5.4.0-40-lowlatency (Ubuntu package): before 5.4.0-40.44~18.04.1

linux-image-5.4.0-40-generic (Ubuntu package): before 5.4.0-40.44~18.04.1

linux-image-5.4.0-28-generic (Ubuntu package): before 5.4.0-28.32

CPE2.3 External links

https://ubuntu.com/security/notices/USN-4411-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###