[USN-4076-1] Linux kernel vulnerabilities
Several security issues were fixed in the Linux kernel.
It was discovered that a race condition existed in the Serial Attached SCSI
(SAS) implementation in the Linux kernel. A local attacker could possibly
use this to cause a denial of service (system crash) or execute arbitrary
code. (CVE-2018-20836)
It was discovered that the ext4 file system implementation in the Linux
kernel did not properly zero out memory in some situations. A local
attacker could use this to expose sensitive information (kernel memory).
(CVE-2019-11833)
It was discovered that the Bluetooth Human Interface Device Protocol (HIDP)
implementation in the Linux kernel did not properly verify strings were
NULL terminated in certain situations. A local attacker could use this to
expose sensitive information (kernel memory). (CVE-2019-11884)
It was discovered that the Linux kernel on ARM processors allowed a tracing
process to modify a syscall after a seccomp decision had been made on that
syscall. A local attacker could possibly use this to bypass seccomp
restrictions. (CVE-2019-2054)
Hugues Anguelkov discovered that the Broadcom Wifi driver in the Linux
kernel did not properly prevent remote firmware events from being processed
for USB Wifi devices. A physically proximate attacker could use this to
send firmware events to the device. (CVE-2019-9503)
It was discovered that an integer overflow existed in the Freescale
(PowerPC) hypervisor manager in the Linux kernel. A local attacker with
write access to /dev/fsl-hv could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2019-10142)
- ID
- USN-4076-1
- Severity
- medium
- URL
- https://ubuntu.com/security/notices/USN-4076-1
- Published
-
2019-07-25T21:51:26
(5 years ago) - Modified
-
2019-07-25T21:51:26
(5 years ago) - Other Advisories
-
- ALAS-2019-1214
- ALAS2-2019-1214
- DSA-4465-1
- DSA-4495-1
- DSA-4497-1
- ELSA-2019-2029
- ELSA-2019-2703
- ELSA-2019-3517
- ELSA-2019-4670
- ELSA-2019-4672
- ELSA-2019-4675
- ELSA-2019-4685
- ELSA-2019-4729
- ELSA-2019-4746
- ELSA-2020-1016
- ELSA-2020-4060
- ELSA-2020-5670
- ELSA-2020-5671
- ELSA-2020-5715
- FEDORA-2019-021c968423
- FEDORA-2019-057d691fd4
- FEDORA-2019-124a241044
- FEDORA-2019-15e141c6a7
- FEDORA-2019-1689d3fe07
- FEDORA-2019-41e28660ae
- FEDORA-2019-48b34fc991
- FEDORA-2019-4c91a2f76e
- FEDORA-2019-640f8d8dd1
- FEDORA-2019-6817686c4d
- FEDORA-2019-69c132b061
- FEDORA-2019-6bda4c81f4
- FEDORA-2019-6c3d89b3d0
- FEDORA-2019-7a3fc17778
- FEDORA-2019-7aecfe1c4b
- FEDORA-2019-7ec378191e
- FEDORA-2019-8169b57f28
- FEDORA-2019-8219efa9f6
- FEDORA-2019-83858fc57b
- FEDORA-2019-8846a1a5a2
- FEDORA-2019-914542e05c
- FEDORA-2019-97380355ae
- FEDORA-2019-9d3fe6fd5b
- FEDORA-2019-a570a92d5a
- FEDORA-2019-a6cd583a8d
- FEDORA-2019-a95015e60f
- FEDORA-2019-b318b2c6f3
- FEDORA-2019-c03eda3cc6
- FEDORA-2019-c36afa818c
- FEDORA-2019-e3010166bd
- FEDORA-2019-e37c348348
- FEDORA-2019-e6bf55e821
- FEDORA-2019-f40bd7826f
- FEDORA-2020-2a5cdd665c
- FEDORA-2020-c2d89d14d0
- FEDORA-2020-fe00e12580
- openSUSE-SU-2019:1404-1
- openSUSE-SU-2019:1479-1
- openSUSE-SU-2019:1579-1
- openSUSE-SU-2019:1716-1
- openSUSE-SU-2019:1757-1
- RHSA-2019:2029
- RHSA-2019:2043
- RHSA-2019:2703
- RHSA-2019:2741
- RHSA-2019:3309
- RHSA-2019:3517
- RHSA-2020:1016
- RHSA-2020:1070
- RHSA-2020:4060
- RHSA-2020:4062
- SSA:2019-169-01
- SUSE-SU-2019:1240-1
- SUSE-SU-2019:1241-1
- SUSE-SU-2019:1242-1
- SUSE-SU-2019:1244-1
- SUSE-SU-2019:1245-1
- SUSE-SU-2019:1287-1
- SUSE-SU-2019:1289-1
- SUSE-SU-2019:1527-1
- SUSE-SU-2019:1529-1
- SUSE-SU-2019:1530-1
- SUSE-SU-2019:1532-1
- SUSE-SU-2019:1533-1
- SUSE-SU-2019:1534-1
- SUSE-SU-2019:1535-1
- SUSE-SU-2019:1536-1
- SUSE-SU-2019:1550-1
- SUSE-SU-2019:1692-1
- SUSE-SU-2019:1823-1
- SUSE-SU-2019:1823-2
- SUSE-SU-2019:1829-1
- SUSE-SU-2019:1851-1
- SUSE-SU-2019:1852-1
- SUSE-SU-2019:1854-1
- SUSE-SU-2019:1855-1
- SUSE-SU-2019:1870-1
- SUSE-SU-2019:2069-1
- SUSE-SU-2019:2430-1
- SUSE-SU-2019:2450-1
- SUSE-SU-2020:1084-1
- SUSE-SU-2020:1118-1
- SUSE-SU-2020:1142-1
- USN-3979-1
- USN-3980-1
- USN-3980-2
- USN-3981-1
- USN-3981-2
- USN-4068-1
- USN-4068-2
- USN-4069-1
- USN-4069-2
- USN-4095-1
- USN-4095-2
- USN-4118-1
- VU:166939
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:deb/ubuntu/linux-image-virtual?distro=xenial | ubuntu | linux-image-virtual | < 4.4.0.157.165 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-virtual-lts-xenial?distro=xenial | ubuntu | linux-image-virtual-lts-xenial | < 4.4.0.157.165 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-virtual-lts-wily?distro=xenial | ubuntu | linux-image-virtual-lts-wily | < 4.4.0.157.165 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-virtual-lts-vivid?distro=xenial | ubuntu | linux-image-virtual-lts-vivid | < 4.4.0.157.165 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-virtual-lts-utopic?distro=xenial | ubuntu | linux-image-virtual-lts-utopic | < 4.4.0.157.165 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-raspi2?distro=xenial | ubuntu | linux-image-raspi2 | < 4.4.0.1117.117 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc64-smp?distro=xenial | ubuntu | linux-image-powerpc64-smp | < 4.4.0.157.165 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc64-smp-lts-xenial?distro=xenial | ubuntu | linux-image-powerpc64-smp-lts-xenial | < 4.4.0.157.165 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc64-smp-lts-wily?distro=xenial | ubuntu | linux-image-powerpc64-smp-lts-wily | < 4.4.0.157.165 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc64-smp-lts-vivid?distro=xenial | ubuntu | linux-image-powerpc64-smp-lts-vivid | < 4.4.0.157.165 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc64-smp-lts-utopic?distro=xenial | ubuntu | linux-image-powerpc64-smp-lts-utopic | < 4.4.0.157.165 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc64-emb?distro=xenial | ubuntu | linux-image-powerpc64-emb | < 4.4.0.157.165 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc64-emb-lts-xenial?distro=xenial | ubuntu | linux-image-powerpc64-emb-lts-xenial | < 4.4.0.157.165 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc64-emb-lts-wily?distro=xenial | ubuntu | linux-image-powerpc64-emb-lts-wily | < 4.4.0.157.165 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc64-emb-lts-vivid?distro=xenial | ubuntu | linux-image-powerpc64-emb-lts-vivid | < 4.4.0.157.165 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc64-emb-lts-utopic?distro=xenial | ubuntu | linux-image-powerpc64-emb-lts-utopic | < 4.4.0.157.165 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-smp?distro=xenial | ubuntu | linux-image-powerpc-smp | < 4.4.0.157.165 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-smp-lts-xenial?distro=xenial | ubuntu | linux-image-powerpc-smp-lts-xenial | < 4.4.0.157.165 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-smp-lts-wily?distro=xenial | ubuntu | linux-image-powerpc-smp-lts-wily | < 4.4.0.157.165 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-smp-lts-vivid?distro=xenial | ubuntu | linux-image-powerpc-smp-lts-vivid | < 4.4.0.157.165 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-smp-lts-utopic?distro=xenial | ubuntu | linux-image-powerpc-smp-lts-utopic | < 4.4.0.157.165 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-e500mc?distro=xenial | ubuntu | linux-image-powerpc-e500mc | < 4.4.0.157.165 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-e500mc-lts-xenial?distro=xenial | ubuntu | linux-image-powerpc-e500mc-lts-xenial | < 4.4.0.157.165 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-e500mc-lts-wily?distro=xenial | ubuntu | linux-image-powerpc-e500mc-lts-wily | < 4.4.0.157.165 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-e500mc-lts-vivid?distro=xenial | ubuntu | linux-image-powerpc-e500mc-lts-vivid | < 4.4.0.157.165 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-e500mc-lts-utopic?distro=xenial | ubuntu | linux-image-powerpc-e500mc-lts-utopic | < 4.4.0.157.165 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency?distro=xenial | ubuntu | linux-image-lowlatency | < 4.4.0.157.165 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency-lts-xenial?distro=xenial | ubuntu | linux-image-lowlatency-lts-xenial | < 4.4.0.157.165 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency-lts-wily?distro=xenial | ubuntu | linux-image-lowlatency-lts-wily | < 4.4.0.157.165 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency-lts-vivid?distro=xenial | ubuntu | linux-image-lowlatency-lts-vivid | < 4.4.0.157.165 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency-lts-utopic?distro=xenial | ubuntu | linux-image-lowlatency-lts-utopic | < 4.4.0.157.165 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-kvm?distro=xenial | ubuntu | linux-image-kvm | < 4.4.0.1052.52 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-generic?distro=xenial | ubuntu | linux-image-generic | < 4.4.0.157.165 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lts-xenial?distro=xenial | ubuntu | linux-image-generic-lts-xenial | < 4.4.0.157.165 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lts-wily?distro=xenial | ubuntu | linux-image-generic-lts-wily | < 4.4.0.157.165 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lts-vivid?distro=xenial | ubuntu | linux-image-generic-lts-vivid | < 4.4.0.157.165 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lts-utopic?distro=xenial | ubuntu | linux-image-generic-lts-utopic | < 4.4.0.157.165 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae?distro=xenial | ubuntu | linux-image-generic-lpae | < 4.4.0.157.165 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae-lts-xenial?distro=xenial | ubuntu | linux-image-generic-lpae-lts-xenial | < 4.4.0.157.165 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae-lts-wily?distro=xenial | ubuntu | linux-image-generic-lpae-lts-wily | < 4.4.0.157.165 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae-lts-vivid?distro=xenial | ubuntu | linux-image-generic-lpae-lts-vivid | < 4.4.0.157.165 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae-lts-utopic?distro=xenial | ubuntu | linux-image-generic-lpae-lts-utopic | < 4.4.0.157.165 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-aws?distro=xenial | ubuntu | linux-image-aws | < 4.4.0.1088.91 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-157-powerpc64-smp?distro=xenial | ubuntu | linux-image-4.4.0-157-powerpc64-smp | < 4.4.0-157.185 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-157-powerpc64-emb?distro=xenial | ubuntu | linux-image-4.4.0-157-powerpc64-emb | < 4.4.0-157.185 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-157-powerpc-smp?distro=xenial | ubuntu | linux-image-4.4.0-157-powerpc-smp | < 4.4.0-157.185 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-157-powerpc-e500mc?distro=xenial | ubuntu | linux-image-4.4.0-157-powerpc-e500mc | < 4.4.0-157.185 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-157-lowlatency?distro=xenial | ubuntu | linux-image-4.4.0-157-lowlatency | < 4.4.0-157.185 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-157-generic?distro=xenial | ubuntu | linux-image-4.4.0-157-generic | < 4.4.0-157.185 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-157-generic-lpae?distro=xenial | ubuntu | linux-image-4.4.0-157-generic-lpae | < 4.4.0-157.185 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-1117-raspi2?distro=xenial | ubuntu | linux-image-4.4.0-1117-raspi2 | < 4.4.0-1117.126 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-1088-aws?distro=xenial | ubuntu | linux-image-4.4.0-1088-aws | < 4.4.0-1088.99 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-1052-kvm?distro=xenial | ubuntu | linux-image-4.4.0-1052-kvm | < 4.4.0-1052.59 | xenial |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |