Description: | Summary: The remote host is missing an update for the 'linux-gke-5.0, linux-oem-osp1' package(s) announced via the USN-4413-1 advisory.
Vulnerability Insight: Matthew Sheets discovered that the SELinux network label handling implementation in the Linux kernel could be coerced into de-referencing a NULL pointer. A remote attacker could use this to cause a denial of service (system crash). (CVE-2020-10711)
It was discovered that the SCSI generic (sg) driver in the Linux kernel did not properly handle certain error conditions correctly. A local privileged attacker could use this to cause a denial of service (system crash). (CVE-2020-12770)
It was discovered that the USB Gadget device driver in the Linux kernel did not validate arguments passed from configfs in some situations. A local attacker could possibly use this to cause a denial of service (system crash) or possibly expose sensitive information. (CVE-2020-13143)
Dmitry Vyukov discovered that the SELinux netlink security hook in the Linux kernel did not validate messages in some situations. A privileged attacker could use this to bypass SELinux netlink restrictions. (CVE-2020-10751)
It was discovered that the KVM implementation in the Linux kernel did not properly deallocate memory on initialization for some processors. A local attacker could possibly use this to cause a denial of service. (CVE-2020-12768)
Affected Software/OS: 'linux-gke-5.0, linux-oem-osp1' package(s) on Ubuntu 18.04.
Solution: Please install the updated package(s).
CVSS Score: 4.6
CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P
|