[USN-3910-1] Linux kernel vulnerabilities
Several security issues were fixed in the Linux kernel.
It was discovered that the f2fs filesystem implementation in the Linux
kernel did not handle the noflush_merge mount option correctly. An attacker
could use this to cause a denial of service (system crash).
(CVE-2017-18241)
It was discovered that the procfs filesystem did not properly handle
processes mapping some memory elements onto files. A local attacker could
use this to block utilities that examine the procfs filesystem to report
operating system state, such as ps(1). (CVE-2018-1120)
Hui Peng and Mathias Payer discovered that the Option USB High Speed driver
in the Linux kernel did not properly validate metadata received from the
device. A physically proximate attacker could use this to cause a denial of
service (system crash). (CVE-2018-19985)
It was discovered that multiple integer overflows existed in the hugetlbfs
implementation in the Linux kernel. A local attacker could use this to
cause a denial of service (system crash). (CVE-2018-7740)
Jann Horn discovered a race condition in the fork() system call in the
Linux kernel. A local attacker could use this to gain access to services
that cache authorizations. (CVE-2019-6133)
- ID
- USN-3910-1
- Severity
- medium
- URL
- https://ubuntu.com/security/notices/USN-3910-1
- Published
-
2019-03-15T22:05:03
(5 years ago) - Modified
-
2019-03-15T22:05:03
(5 years ago) - Other Advisories
-
- ALAS-2018-1038
- ALAS2-2018-1038
- ALAS2-2019-1171
- ALPINE:CVE-2019-6133
- DSA-4187-1
- DSA-4188-1
- ELSA-2018-3083
- ELSA-2019-0230
- ELSA-2019-0420
- ELSA-2019-3517
- ELSA-2019-4642
- ELSA-2019-4643
- ELSA-2019-4644
- ELSA-2019-4646
- ELSA-2019-4708
- ELSA-2019-4710
- ELSA-2020-1016
- FEDORA-2018-0edb45d9db
- FEDORA-2018-1621b2204a
- FEDORA-2018-1c80fea1cd
- FEDORA-2018-2a0f8b2c9d
- FEDORA-2018-2c6bd93875
- FEDORA-2018-2ee3411cb8
- FEDORA-2018-2f6df9abfb
- FEDORA-2018-3857a8b41a
- FEDORA-2018-49bda79bd5
- FEDORA-2018-50075276e8
- FEDORA-2018-537c8312fc
- FEDORA-2018-59e4747e0f
- FEDORA-2018-6367a17aa3
- FEDORA-2018-6e8c330d50
- FEDORA-2018-79d7c3d2df
- FEDORA-2018-8422d94975
- FEDORA-2018-8484550fff
- FEDORA-2018-8ce90c8b24
- FEDORA-2018-93af520878
- FEDORA-2018-93c2e74446
- FEDORA-2018-94315e9a6b
- FEDORA-2018-9d0e4e40b5
- FEDORA-2018-9f4381d8c4
- FEDORA-2018-a0914af224
- FEDORA-2018-b57db4753c
- FEDORA-2018-b68776e5b0
- FEDORA-2018-b997780dca
- FEDORA-2018-bb7aab12cb
- FEDORA-2018-c0a1284064
- FEDORA-2018-c449dc1c9c
- FEDORA-2018-ca0e10fc6e
- FEDORA-2018-cc812838fb
- FEDORA-2018-d77cc41f35
- FEDORA-2018-d82a45d9ab
- FEDORA-2018-d92fde52d7
- FEDORA-2018-db0d3e157e
- FEDORA-2018-ddbaca855e
- FEDORA-2018-e820fccd83
- FEDORA-2018-e8f793bbfc
- FEDORA-2018-f1b818a5c9
- FEDORA-2018-f8cba144ae
- FEDORA-2019-16de0047d4
- FEDORA-2019-196ab64d65
- FEDORA-2019-1b986880ea
- FEDORA-2019-20a89ca9af
- FEDORA-2019-337484d88b
- FEDORA-2019-3da64f3e61
- FEDORA-2019-4002b91800
- FEDORA-2019-509c133845
- FEDORA-2019-65c6d11eba
- FEDORA-2019-7d3500d712
- FEDORA-2019-a6cd583a8d
- FEDORA-2019-c36afa818c
- FEDORA-2019-ce2933b003
- GLSA-201805-14
- openSUSE-SU-2019:0065-1
- openSUSE-SU-2019:1914-1
- RHSA-2018:3083
- RHSA-2018:3096
- RHSA-2019:0230
- RHSA-2019:0420
- RHSA-2019:3309
- RHSA-2019:3517
- RHSA-2020:1016
- RHSA-2020:1070
- SSA:2019-030-01
- SUSE-SU-2018:1048-1
- SUSE-SU-2018:1173-1
- SUSE-SU-2018:1173-2
- SUSE-SU-2018:1217-1
- SUSE-SU-2018:1772-1
- SUSE-SU-2018:1816-1
- SUSE-SU-2018:1855-1
- SUSE-SU-2018:1855-2
- SUSE-SU-2018:2092-1
- SUSE-SU-2019:0148-1
- SUSE-SU-2019:0150-1
- SUSE-SU-2019:0196-1
- SUSE-SU-2019:0222-1
- SUSE-SU-2019:0224-1
- SUSE-SU-2019:0320-1
- SUSE-SU-2019:0439-1
- SUSE-SU-2019:0541-1
- SUSE-SU-2019:1287-1
- SUSE-SU-2019:1289-1
- SUSE-SU-2019:2018-1
- SUSE-SU-2019:2035-1
- SUSE-SU-2019:2035-2
- SUSE-SU-2020:3503-1
- SUSE-SU-2021:0437-1
- USN-3752-1
- USN-3752-2
- USN-3752-3
- USN-3901-1
- USN-3901-2
- USN-3903-1
- USN-3903-2
- USN-3908-1
- USN-3908-2
- USN-3910-2
- USN-3934-1
- USN-3934-2
- USN-4115-1
- USN-4118-1
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:deb/ubuntu/linux-image-virtual?distro=xenial | ubuntu | linux-image-virtual | < 4.4.0.143.151 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-virtual-lts-xenial?distro=xenial | ubuntu | linux-image-virtual-lts-xenial | < 4.4.0.143.151 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-virtual-lts-wily?distro=xenial | ubuntu | linux-image-virtual-lts-wily | < 4.4.0.143.151 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-virtual-lts-vivid?distro=xenial | ubuntu | linux-image-virtual-lts-vivid | < 4.4.0.143.151 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-virtual-lts-utopic?distro=xenial | ubuntu | linux-image-virtual-lts-utopic | < 4.4.0.143.151 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-snapdragon?distro=xenial | ubuntu | linux-image-snapdragon | < 4.4.0.1108.100 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-raspi2?distro=xenial | ubuntu | linux-image-raspi2 | < 4.4.0.1104.104 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc64-smp?distro=xenial | ubuntu | linux-image-powerpc64-smp | < 4.4.0.143.151 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc64-smp-lts-xenial?distro=xenial | ubuntu | linux-image-powerpc64-smp-lts-xenial | < 4.4.0.143.151 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc64-smp-lts-wily?distro=xenial | ubuntu | linux-image-powerpc64-smp-lts-wily | < 4.4.0.143.151 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc64-smp-lts-vivid?distro=xenial | ubuntu | linux-image-powerpc64-smp-lts-vivid | < 4.4.0.143.151 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc64-smp-lts-utopic?distro=xenial | ubuntu | linux-image-powerpc64-smp-lts-utopic | < 4.4.0.143.151 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc64-emb?distro=xenial | ubuntu | linux-image-powerpc64-emb | < 4.4.0.143.151 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc64-emb-lts-xenial?distro=xenial | ubuntu | linux-image-powerpc64-emb-lts-xenial | < 4.4.0.143.151 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc64-emb-lts-wily?distro=xenial | ubuntu | linux-image-powerpc64-emb-lts-wily | < 4.4.0.143.151 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc64-emb-lts-vivid?distro=xenial | ubuntu | linux-image-powerpc64-emb-lts-vivid | < 4.4.0.143.151 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc64-emb-lts-utopic?distro=xenial | ubuntu | linux-image-powerpc64-emb-lts-utopic | < 4.4.0.143.151 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-smp?distro=xenial | ubuntu | linux-image-powerpc-smp | < 4.4.0.143.151 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-smp-lts-xenial?distro=xenial | ubuntu | linux-image-powerpc-smp-lts-xenial | < 4.4.0.143.151 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-smp-lts-wily?distro=xenial | ubuntu | linux-image-powerpc-smp-lts-wily | < 4.4.0.143.151 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-smp-lts-vivid?distro=xenial | ubuntu | linux-image-powerpc-smp-lts-vivid | < 4.4.0.143.151 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-smp-lts-utopic?distro=xenial | ubuntu | linux-image-powerpc-smp-lts-utopic | < 4.4.0.143.151 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-e500mc?distro=xenial | ubuntu | linux-image-powerpc-e500mc | < 4.4.0.143.151 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-e500mc-lts-xenial?distro=xenial | ubuntu | linux-image-powerpc-e500mc-lts-xenial | < 4.4.0.143.151 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-e500mc-lts-wily?distro=xenial | ubuntu | linux-image-powerpc-e500mc-lts-wily | < 4.4.0.143.151 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-e500mc-lts-vivid?distro=xenial | ubuntu | linux-image-powerpc-e500mc-lts-vivid | < 4.4.0.143.151 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-e500mc-lts-utopic?distro=xenial | ubuntu | linux-image-powerpc-e500mc-lts-utopic | < 4.4.0.143.151 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency?distro=xenial | ubuntu | linux-image-lowlatency | < 4.4.0.143.151 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency-lts-xenial?distro=xenial | ubuntu | linux-image-lowlatency-lts-xenial | < 4.4.0.143.151 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency-lts-wily?distro=xenial | ubuntu | linux-image-lowlatency-lts-wily | < 4.4.0.143.151 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency-lts-vivid?distro=xenial | ubuntu | linux-image-lowlatency-lts-vivid | < 4.4.0.143.151 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency-lts-utopic?distro=xenial | ubuntu | linux-image-lowlatency-lts-utopic | < 4.4.0.143.151 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-kvm?distro=xenial | ubuntu | linux-image-kvm | < 4.4.0.1041.41 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-generic?distro=xenial | ubuntu | linux-image-generic | < 4.4.0.143.151 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lts-xenial?distro=xenial | ubuntu | linux-image-generic-lts-xenial | < 4.4.0.143.151 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lts-wily?distro=xenial | ubuntu | linux-image-generic-lts-wily | < 4.4.0.143.151 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lts-vivid?distro=xenial | ubuntu | linux-image-generic-lts-vivid | < 4.4.0.143.151 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lts-utopic?distro=xenial | ubuntu | linux-image-generic-lts-utopic | < 4.4.0.143.151 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae?distro=xenial | ubuntu | linux-image-generic-lpae | < 4.4.0.143.151 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae-lts-xenial?distro=xenial | ubuntu | linux-image-generic-lpae-lts-xenial | < 4.4.0.143.151 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae-lts-wily?distro=xenial | ubuntu | linux-image-generic-lpae-lts-wily | < 4.4.0.143.151 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae-lts-vivid?distro=xenial | ubuntu | linux-image-generic-lpae-lts-vivid | < 4.4.0.143.151 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae-lts-utopic?distro=xenial | ubuntu | linux-image-generic-lpae-lts-utopic | < 4.4.0.143.151 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-aws?distro=xenial | ubuntu | linux-image-aws | < 4.4.0.1077.80 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-143-powerpc64-smp?distro=xenial | ubuntu | linux-image-4.4.0-143-powerpc64-smp | < 4.4.0-143.169 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-143-powerpc64-emb?distro=xenial | ubuntu | linux-image-4.4.0-143-powerpc64-emb | < 4.4.0-143.169 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-143-powerpc-smp?distro=xenial | ubuntu | linux-image-4.4.0-143-powerpc-smp | < 4.4.0-143.169 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-143-powerpc-e500mc?distro=xenial | ubuntu | linux-image-4.4.0-143-powerpc-e500mc | < 4.4.0-143.169 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-143-lowlatency?distro=xenial | ubuntu | linux-image-4.4.0-143-lowlatency | < 4.4.0-143.169 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-143-generic?distro=xenial | ubuntu | linux-image-4.4.0-143-generic | < 4.4.0-143.169 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-143-generic-lpae?distro=xenial | ubuntu | linux-image-4.4.0-143-generic-lpae | < 4.4.0-143.169 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-1108-snapdragon?distro=xenial | ubuntu | linux-image-4.4.0-1108-snapdragon | < 4.4.0-1108.113 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-1104-raspi2?distro=xenial | ubuntu | linux-image-4.4.0-1104-raspi2 | < 4.4.0-1104.112 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-1077-aws?distro=xenial | ubuntu | linux-image-4.4.0-1077-aws | < 4.4.0-1077.87 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-1041-kvm?distro=xenial | ubuntu | linux-image-4.4.0-1041-kvm | < 4.4.0-1041.47 | xenial |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |