[USN-3901-1] Linux kernel vulnerabilities
Severity
Medium
Affected Packages
30
CVEs
3
Several security issues were fixed in the Linux kernel.
Jann Horn discovered that the userfaultd implementation in the Linux kernel
did not properly restrict access to certain ioctls. A local attacker could
use this possibly to modify files. (CVE-2018-18397)
It was discovered that the crypto subsystem of the Linux kernel leaked
uninitialized memory to user space in some situations. A local attacker
could use this to expose sensitive information (kernel memory).
(CVE-2018-19854)
Jann Horn discovered a race condition in the fork() system call in
the Linux kernel. A local attacker could use this to gain access to
services that cache authorizations. (CVE-2019-6133)
- ID
- USN-3901-1
- Severity
- medium
- URL
- https://ubuntu.com/security/notices/USN-3901-1
- Published
-
2019-03-05T20:44:55
(5 years ago) - Modified
-
2019-03-05T20:44:55
(5 years ago) - Other Advisories
-
- ALAS2-2019-1171
- ALPINE:CVE-2019-6133
- ELSA-2019-0163
- ELSA-2019-0230
- ELSA-2019-0420
- ELSA-2019-3517
- ELSA-2019-4528
- ELSA-2019-4541
- ELSA-2019-4708
- ELSA-2019-4710
- ELSA-2020-5676
- openSUSE-SU-2019:0065-1
- openSUSE-SU-2019:1914-1
- RHSA-2019:0163
- RHSA-2019:0230
- RHSA-2019:0420
- RHSA-2019:3309
- RHSA-2019:3517
- SUSE-SU-2019:0150-1
- SUSE-SU-2019:0196-1
- SUSE-SU-2019:0222-1
- SUSE-SU-2019:0224-1
- SUSE-SU-2019:2018-1
- SUSE-SU-2019:2035-1
- SUSE-SU-2019:2035-2
- SUSE-SU-2020:3503-1
- SUSE-SU-2021:0437-1
- USN-3872-1
- USN-3878-1
- USN-3878-2
- USN-3901-2
- USN-3903-1
- USN-3903-2
- USN-3908-1
- USN-3908-2
- USN-3910-1
- USN-3910-2
- USN-3934-1
- USN-3934-2
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:deb/ubuntu/linux-image-virtual?distro=bionic | ubuntu | linux-image-virtual | < 4.15.0.46.48 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-virtual-hwe-16.04?distro=bionic | ubuntu | linux-image-virtual-hwe-16.04 | < 4.15.0.46.48 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-virtual-hwe-16.04-edge?distro=bionic | ubuntu | linux-image-virtual-hwe-16.04-edge | < 4.15.0.46.48 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-snapdragon?distro=bionic | ubuntu | linux-image-snapdragon | < 4.15.0.46.48 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-raspi2?distro=bionic | ubuntu | linux-image-raspi2 | < 4.15.0.1032.30 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-oracle?distro=bionic | ubuntu | linux-image-oracle | < 4.15.0.1009.12 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-oem?distro=bionic | ubuntu | linux-image-oem | < 4.15.0.1034.39 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency?distro=bionic | ubuntu | linux-image-lowlatency | < 4.15.0.46.48 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency-hwe-16.04?distro=bionic | ubuntu | linux-image-lowlatency-hwe-16.04 | < 4.15.0.46.48 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency-hwe-16.04-edge?distro=bionic | ubuntu | linux-image-lowlatency-hwe-16.04-edge | < 4.15.0.46.48 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-kvm?distro=bionic | ubuntu | linux-image-kvm | < 4.15.0.1030.30 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-gke?distro=bionic | ubuntu | linux-image-gke | < 4.15.0.1028.30 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-generic?distro=bionic | ubuntu | linux-image-generic | < 4.15.0.46.48 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae?distro=bionic | ubuntu | linux-image-generic-lpae | < 4.15.0.46.48 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae-hwe-16.04?distro=bionic | ubuntu | linux-image-generic-lpae-hwe-16.04 | < 4.15.0.46.48 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae-hwe-16.04-edge?distro=bionic | ubuntu | linux-image-generic-lpae-hwe-16.04-edge | < 4.15.0.46.48 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-generic-hwe-16.04?distro=bionic | ubuntu | linux-image-generic-hwe-16.04 | < 4.15.0.46.48 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-generic-hwe-16.04-edge?distro=bionic | ubuntu | linux-image-generic-hwe-16.04-edge | < 4.15.0.46.48 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-gcp?distro=bionic | ubuntu | linux-image-gcp | < 4.15.0.1028.30 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-aws?distro=bionic | ubuntu | linux-image-aws | < 4.15.0.1033.32 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-4.15.0-46-snapdragon?distro=bionic | ubuntu | linux-image-4.15.0-46-snapdragon | < 4.15.0-46.49 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-4.15.0-46-lowlatency?distro=bionic | ubuntu | linux-image-4.15.0-46-lowlatency | < 4.15.0-46.49 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-4.15.0-46-generic?distro=bionic | ubuntu | linux-image-4.15.0-46-generic | < 4.15.0-46.49 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-4.15.0-46-generic-lpae?distro=bionic | ubuntu | linux-image-4.15.0-46-generic-lpae | < 4.15.0-46.49 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-4.15.0-1034-oem?distro=bionic | ubuntu | linux-image-4.15.0-1034-oem | < 4.15.0-1034.39 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-4.15.0-1033-aws?distro=bionic | ubuntu | linux-image-4.15.0-1033-aws | < 4.15.0-1033.35 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-4.15.0-1032-raspi2?distro=bionic | ubuntu | linux-image-4.15.0-1032-raspi2 | < 4.15.0-1032.34 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-4.15.0-1030-kvm?distro=bionic | ubuntu | linux-image-4.15.0-1030-kvm | < 4.15.0-1030.30 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-4.15.0-1028-gcp?distro=bionic | ubuntu | linux-image-4.15.0-1028-gcp | < 4.15.0-1028.29 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-4.15.0-1009-oracle?distro=bionic | ubuntu | linux-image-4.15.0-1009-oracle | < 4.15.0-1009.11 | bionic |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |