[USN-4145-1] Linux kernel vulnerabilities
Several security issues were fixed in the Linux kernel.
It was discovered that a race condition existed in the GFS2 file system in
the Linux kernel. A local attacker could possibly use this to cause a
denial of service (system crash). (CVE-2016-10905)
It was discovered that the IPv6 implementation in the Linux kernel did not
properly validate socket options in some situations. A local attacker could
use this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2017-18509)
It was discovered that the USB gadget Midi driver in the Linux kernel
contained a double-free vulnerability when handling certain error
conditions. A local attacker could use this to cause a denial of service
(system crash). (CVE-2018-20961)
It was discovered that the XFS file system in the Linux kernel did not
properly handle mount failures in some situations. A local attacker could
possibly use this to cause a denial of service (system crash) or execute
arbitrary code. (CVE-2018-20976)
It was discovered that the Intel Wi-Fi device driver in the Linux kernel
did not properly validate certain Tunneled Direct Link Setup (TDLS). A
physically proximate attacker could use this to cause a denial of service
(Wi-Fi disconnect). (CVE-2019-0136)
It was discovered that the Bluetooth UART implementation in the Linux
kernel did not properly check for missing tty operations. A local attacker
could use this to cause a denial of service. (CVE-2019-10207)
It was discovered that an integer overflow existed in the Linux kernel when
reference counting pages, leading to potential use-after-free issues. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2019-11487)
It was discovered that the GTCO tablet input driver in the Linux kernel did
not properly bounds check the initial HID report sent by the device. A
physically proximate attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2019-13631)
It was discovered that the Raremono AM/FM/SW radio device driver in the
Linux kernel did not properly allocate memory, leading to a use-after-free.
A physically proximate attacker could use this to cause a denial of service
or possibly execute arbitrary code. (CVE-2019-15211)
It was discovered that a race condition existed in the CPiA2 video4linux
device driver for the Linux kernel, leading to a use-after-free. A
physically proximate attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2019-15215)
It was discovered that the Atheros mobile chipset driver in the Linux
kernel did not properly validate data in some situations. An attacker could
use this to cause a denial of service (system crash). (CVE-2019-15926)
- ID
- USN-4145-1
- Severity
- medium
- URL
- https://ubuntu.com/security/notices/USN-4145-1
- Published
-
2019-10-01T04:12:54
(5 years ago) - Modified
-
2019-10-01T04:12:54
(5 years ago) - Other Advisories
-
- ALSA-2024:3138
- ASB-A-172999675
- DSA-4495-1
- DSA-4497-1
- ELSA-2019-2703
- ELSA-2019-3517
- ELSA-2019-4739
- ELSA-2019-4741
- ELSA-2019-4746
- ELSA-2019-4820
- ELSA-2019-4850
- ELSA-2019-4855
- ELSA-2019-4871
- ELSA-2020-0834
- ELSA-2020-1016
- ELSA-2020-4182
- ELSA-2020-5845
- ELSA-2020-5866
- ELSA-2020-5879
- ELSA-2021-9534
- ELSA-2024-3138
- FEDORA-2019-021c968423
- FEDORA-2019-057d691fd4
- FEDORA-2019-124a241044
- FEDORA-2019-15e141c6a7
- FEDORA-2019-1689d3fe07
- FEDORA-2019-3dbfaeac73
- FEDORA-2019-41e28660ae
- FEDORA-2019-4c91a2f76e
- FEDORA-2019-6bda4c81f4
- FEDORA-2019-7a3fc17778
- FEDORA-2019-7aecfe1c4b
- FEDORA-2019-8846a1a5a2
- FEDORA-2019-97380355ae
- FEDORA-2019-9d3fe6fd5b
- FEDORA-2019-a570a92d5a
- FEDORA-2019-e3010166bd
- FEDORA-2019-e37c348348
- FEDORA-2020-2a5cdd665c
- FEDORA-2020-c2d89d14d0
- FEDORA-2020-fe00e12580
- openSUSE-SU-2019:1571-1
- openSUSE-SU-2019:1579-1
- openSUSE-SU-2019:1923-1
- openSUSE-SU-2019:1924-1
- openSUSE-SU-2019:2173-1
- openSUSE-SU-2019:2181-1
- RHSA-2019:2703
- RHSA-2019:2741
- RHSA-2019:3309
- RHSA-2019:3517
- RHSA-2020:0834
- RHSA-2020:0839
- RHSA-2020:1016
- RHSA-2020:1070
- RHSA-2020:3220
- RHSA-2020:4182
- RHSA-2024:2950
- RHSA-2024:3138
- RLSA-2024:3138
- SSA:2019-226-01
- SSA:2019-238-01
- SSA:2019-311-01
- SSA:2020-086-01
- SUSE-SU-2019:1529-1
- SUSE-SU-2019:1530-1
- SUSE-SU-2019:1535-1
- SUSE-SU-2019:1536-1
- SUSE-SU-2019:1550-1
- SUSE-SU-2019:1581-1
- SUSE-SU-2019:1588-1
- SUSE-SU-2019:1668-1
- SUSE-SU-2019:1671-1
- SUSE-SU-2019:1674-1
- SUSE-SU-2019:1767-1
- SUSE-SU-2019:1768-1
- SUSE-SU-2019:1823-1
- SUSE-SU-2019:1823-2
- SUSE-SU-2019:1852-1
- SUSE-SU-2019:1870-1
- SUSE-SU-2019:2068-1
- SUSE-SU-2019:2069-1
- SUSE-SU-2019:2070-1
- SUSE-SU-2019:2071-1
- SUSE-SU-2019:2072-1
- SUSE-SU-2019:2073-1
- SUSE-SU-2019:2262-1
- SUSE-SU-2019:2263-1
- SUSE-SU-2019:2299-1
- SUSE-SU-2019:2412-1
- SUSE-SU-2019:2414-1
- SUSE-SU-2019:2424-1
- SUSE-SU-2019:2430-1
- SUSE-SU-2019:2450-1
- SUSE-SU-2019:2648-1
- SUSE-SU-2019:2651-1
- SUSE-SU-2019:2658-1
- SUSE-SU-2019:2738-1
- SUSE-SU-2019:2756-1
- SUSE-SU-2019:2821-1
- SUSE-SU-2019:2949-1
- SUSE-SU-2019:2950-1
- SUSE-SU-2019:2984-1
- SUSE-SU-2022:0325-1
- SUSE-SU-2022:0327-1
- SUSE-SU-2022:0328-1
- SUSE-SU-2022:0329-1
- SUSE-SU-2022:0362-1
- SUSE-SU-2022:0477-1
- SUSE-SU-2022:0756-1
- SUSE-SU-2022:0762-1
- USN-4069-1
- USN-4069-2
- USN-4115-1
- USN-4118-1
- USN-4144-1
- USN-4147-1
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:deb/ubuntu/linux-image-virtual?distro=xenial | ubuntu | linux-image-virtual | < 4.4.0.165.173 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-virtual-lts-xenial?distro=xenial | ubuntu | linux-image-virtual-lts-xenial | < 4.4.0.165.173 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-virtual-lts-wily?distro=xenial | ubuntu | linux-image-virtual-lts-wily | < 4.4.0.165.173 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-virtual-lts-vivid?distro=xenial | ubuntu | linux-image-virtual-lts-vivid | < 4.4.0.165.173 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-virtual-lts-utopic?distro=xenial | ubuntu | linux-image-virtual-lts-utopic | < 4.4.0.165.173 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-snapdragon?distro=xenial | ubuntu | linux-image-snapdragon | < 4.4.0.1127.119 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-raspi2?distro=xenial | ubuntu | linux-image-raspi2 | < 4.4.0.1123.123 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc64-smp?distro=xenial | ubuntu | linux-image-powerpc64-smp | < 4.4.0.165.173 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc64-smp-lts-xenial?distro=xenial | ubuntu | linux-image-powerpc64-smp-lts-xenial | < 4.4.0.165.173 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc64-smp-lts-wily?distro=xenial | ubuntu | linux-image-powerpc64-smp-lts-wily | < 4.4.0.165.173 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc64-smp-lts-vivid?distro=xenial | ubuntu | linux-image-powerpc64-smp-lts-vivid | < 4.4.0.165.173 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc64-smp-lts-utopic?distro=xenial | ubuntu | linux-image-powerpc64-smp-lts-utopic | < 4.4.0.165.173 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc64-emb?distro=xenial | ubuntu | linux-image-powerpc64-emb | < 4.4.0.165.173 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc64-emb-lts-xenial?distro=xenial | ubuntu | linux-image-powerpc64-emb-lts-xenial | < 4.4.0.165.173 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc64-emb-lts-wily?distro=xenial | ubuntu | linux-image-powerpc64-emb-lts-wily | < 4.4.0.165.173 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc64-emb-lts-vivid?distro=xenial | ubuntu | linux-image-powerpc64-emb-lts-vivid | < 4.4.0.165.173 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc64-emb-lts-utopic?distro=xenial | ubuntu | linux-image-powerpc64-emb-lts-utopic | < 4.4.0.165.173 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-smp?distro=xenial | ubuntu | linux-image-powerpc-smp | < 4.4.0.165.173 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-smp-lts-xenial?distro=xenial | ubuntu | linux-image-powerpc-smp-lts-xenial | < 4.4.0.165.173 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-smp-lts-wily?distro=xenial | ubuntu | linux-image-powerpc-smp-lts-wily | < 4.4.0.165.173 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-smp-lts-vivid?distro=xenial | ubuntu | linux-image-powerpc-smp-lts-vivid | < 4.4.0.165.173 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-smp-lts-utopic?distro=xenial | ubuntu | linux-image-powerpc-smp-lts-utopic | < 4.4.0.165.173 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-e500mc?distro=xenial | ubuntu | linux-image-powerpc-e500mc | < 4.4.0.165.173 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-e500mc-lts-xenial?distro=xenial | ubuntu | linux-image-powerpc-e500mc-lts-xenial | < 4.4.0.165.173 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-e500mc-lts-wily?distro=xenial | ubuntu | linux-image-powerpc-e500mc-lts-wily | < 4.4.0.165.173 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-e500mc-lts-vivid?distro=xenial | ubuntu | linux-image-powerpc-e500mc-lts-vivid | < 4.4.0.165.173 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-e500mc-lts-utopic?distro=xenial | ubuntu | linux-image-powerpc-e500mc-lts-utopic | < 4.4.0.165.173 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency?distro=xenial | ubuntu | linux-image-lowlatency | < 4.4.0.165.173 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency-lts-xenial?distro=xenial | ubuntu | linux-image-lowlatency-lts-xenial | < 4.4.0.165.173 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency-lts-wily?distro=xenial | ubuntu | linux-image-lowlatency-lts-wily | < 4.4.0.165.173 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency-lts-vivid?distro=xenial | ubuntu | linux-image-lowlatency-lts-vivid | < 4.4.0.165.173 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency-lts-utopic?distro=xenial | ubuntu | linux-image-lowlatency-lts-utopic | < 4.4.0.165.173 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-kvm?distro=xenial | ubuntu | linux-image-kvm | < 4.4.0.1059.59 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-generic?distro=xenial | ubuntu | linux-image-generic | < 4.4.0.165.173 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lts-xenial?distro=xenial | ubuntu | linux-image-generic-lts-xenial | < 4.4.0.165.173 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lts-wily?distro=xenial | ubuntu | linux-image-generic-lts-wily | < 4.4.0.165.173 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lts-vivid?distro=xenial | ubuntu | linux-image-generic-lts-vivid | < 4.4.0.165.173 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lts-utopic?distro=xenial | ubuntu | linux-image-generic-lts-utopic | < 4.4.0.165.173 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae?distro=xenial | ubuntu | linux-image-generic-lpae | < 4.4.0.165.173 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae-lts-xenial?distro=xenial | ubuntu | linux-image-generic-lpae-lts-xenial | < 4.4.0.165.173 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae-lts-wily?distro=xenial | ubuntu | linux-image-generic-lpae-lts-wily | < 4.4.0.165.173 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae-lts-vivid?distro=xenial | ubuntu | linux-image-generic-lpae-lts-vivid | < 4.4.0.165.173 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae-lts-utopic?distro=xenial | ubuntu | linux-image-generic-lpae-lts-utopic | < 4.4.0.165.173 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-aws?distro=xenial | ubuntu | linux-image-aws | < 4.4.0.1095.99 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-165-powerpc64-smp?distro=xenial | ubuntu | linux-image-4.4.0-165-powerpc64-smp | < 4.4.0-165.193 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-165-powerpc64-emb?distro=xenial | ubuntu | linux-image-4.4.0-165-powerpc64-emb | < 4.4.0-165.193 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-165-powerpc-smp?distro=xenial | ubuntu | linux-image-4.4.0-165-powerpc-smp | < 4.4.0-165.193 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-165-powerpc-e500mc?distro=xenial | ubuntu | linux-image-4.4.0-165-powerpc-e500mc | < 4.4.0-165.193 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-165-lowlatency?distro=xenial | ubuntu | linux-image-4.4.0-165-lowlatency | < 4.4.0-165.193 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-165-generic?distro=xenial | ubuntu | linux-image-4.4.0-165-generic | < 4.4.0-165.193 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-165-generic-lpae?distro=xenial | ubuntu | linux-image-4.4.0-165-generic-lpae | < 4.4.0-165.193 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-1127-snapdragon?distro=xenial | ubuntu | linux-image-4.4.0-1127-snapdragon | < 4.4.0-1127.135 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-1123-raspi2?distro=xenial | ubuntu | linux-image-4.4.0-1123-raspi2 | < 4.4.0-1123.132 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-1095-aws?distro=xenial | ubuntu | linux-image-4.4.0-1095-aws | < 4.4.0-1095.106 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-1059-kvm?distro=xenial | ubuntu | linux-image-4.4.0-1059-kvm | < 4.4.0-1059.66 | xenial |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |