[USN-4145-1] Linux kernel vulnerabilities

Severity Medium
Affected Packages 55
CVEs 11

Several security issues were fixed in the Linux kernel.

It was discovered that a race condition existed in the GFS2 file system in
the Linux kernel. A local attacker could possibly use this to cause a
denial of service (system crash). (CVE-2016-10905)

It was discovered that the IPv6 implementation in the Linux kernel did not
properly validate socket options in some situations. A local attacker could
use this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2017-18509)

It was discovered that the USB gadget Midi driver in the Linux kernel
contained a double-free vulnerability when handling certain error
conditions. A local attacker could use this to cause a denial of service
(system crash). (CVE-2018-20961)

It was discovered that the XFS file system in the Linux kernel did not
properly handle mount failures in some situations. A local attacker could
possibly use this to cause a denial of service (system crash) or execute
arbitrary code. (CVE-2018-20976)

It was discovered that the Intel Wi-Fi device driver in the Linux kernel
did not properly validate certain Tunneled Direct Link Setup (TDLS). A
physically proximate attacker could use this to cause a denial of service
(Wi-Fi disconnect). (CVE-2019-0136)

It was discovered that the Bluetooth UART implementation in the Linux
kernel did not properly check for missing tty operations. A local attacker
could use this to cause a denial of service. (CVE-2019-10207)

It was discovered that an integer overflow existed in the Linux kernel when
reference counting pages, leading to potential use-after-free issues. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2019-11487)

It was discovered that the GTCO tablet input driver in the Linux kernel did
not properly bounds check the initial HID report sent by the device. A
physically proximate attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2019-13631)

It was discovered that the Raremono AM/FM/SW radio device driver in the
Linux kernel did not properly allocate memory, leading to a use-after-free.
A physically proximate attacker could use this to cause a denial of service
or possibly execute arbitrary code. (CVE-2019-15211)

It was discovered that a race condition existed in the CPiA2 video4linux
device driver for the Linux kernel, leading to a use-after-free. A
physically proximate attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2019-15215)

It was discovered that the Atheros mobile chipset driver in the Linux
kernel did not properly validate data in some situations. An attacker could
use this to cause a denial of service (system crash). (CVE-2019-15926)

Package Affected Version
pkg:deb/ubuntu/linux-image-virtual?distro=xenial < 4.4.0.165.173
pkg:deb/ubuntu/linux-image-virtual-lts-xenial?distro=xenial < 4.4.0.165.173
pkg:deb/ubuntu/linux-image-virtual-lts-wily?distro=xenial < 4.4.0.165.173
pkg:deb/ubuntu/linux-image-virtual-lts-vivid?distro=xenial < 4.4.0.165.173
pkg:deb/ubuntu/linux-image-virtual-lts-utopic?distro=xenial < 4.4.0.165.173
pkg:deb/ubuntu/linux-image-snapdragon?distro=xenial < 4.4.0.1127.119
pkg:deb/ubuntu/linux-image-raspi2?distro=xenial < 4.4.0.1123.123
pkg:deb/ubuntu/linux-image-powerpc64-smp?distro=xenial < 4.4.0.165.173
pkg:deb/ubuntu/linux-image-powerpc64-smp-lts-xenial?distro=xenial < 4.4.0.165.173
pkg:deb/ubuntu/linux-image-powerpc64-smp-lts-wily?distro=xenial < 4.4.0.165.173
pkg:deb/ubuntu/linux-image-powerpc64-smp-lts-vivid?distro=xenial < 4.4.0.165.173
pkg:deb/ubuntu/linux-image-powerpc64-smp-lts-utopic?distro=xenial < 4.4.0.165.173
pkg:deb/ubuntu/linux-image-powerpc64-emb?distro=xenial < 4.4.0.165.173
pkg:deb/ubuntu/linux-image-powerpc64-emb-lts-xenial?distro=xenial < 4.4.0.165.173
pkg:deb/ubuntu/linux-image-powerpc64-emb-lts-wily?distro=xenial < 4.4.0.165.173
pkg:deb/ubuntu/linux-image-powerpc64-emb-lts-vivid?distro=xenial < 4.4.0.165.173
pkg:deb/ubuntu/linux-image-powerpc64-emb-lts-utopic?distro=xenial < 4.4.0.165.173
pkg:deb/ubuntu/linux-image-powerpc-smp?distro=xenial < 4.4.0.165.173
pkg:deb/ubuntu/linux-image-powerpc-smp-lts-xenial?distro=xenial < 4.4.0.165.173
pkg:deb/ubuntu/linux-image-powerpc-smp-lts-wily?distro=xenial < 4.4.0.165.173
pkg:deb/ubuntu/linux-image-powerpc-smp-lts-vivid?distro=xenial < 4.4.0.165.173
pkg:deb/ubuntu/linux-image-powerpc-smp-lts-utopic?distro=xenial < 4.4.0.165.173
pkg:deb/ubuntu/linux-image-powerpc-e500mc?distro=xenial < 4.4.0.165.173
pkg:deb/ubuntu/linux-image-powerpc-e500mc-lts-xenial?distro=xenial < 4.4.0.165.173
pkg:deb/ubuntu/linux-image-powerpc-e500mc-lts-wily?distro=xenial < 4.4.0.165.173
pkg:deb/ubuntu/linux-image-powerpc-e500mc-lts-vivid?distro=xenial < 4.4.0.165.173
pkg:deb/ubuntu/linux-image-powerpc-e500mc-lts-utopic?distro=xenial < 4.4.0.165.173
pkg:deb/ubuntu/linux-image-lowlatency?distro=xenial < 4.4.0.165.173
pkg:deb/ubuntu/linux-image-lowlatency-lts-xenial?distro=xenial < 4.4.0.165.173
pkg:deb/ubuntu/linux-image-lowlatency-lts-wily?distro=xenial < 4.4.0.165.173
pkg:deb/ubuntu/linux-image-lowlatency-lts-vivid?distro=xenial < 4.4.0.165.173
pkg:deb/ubuntu/linux-image-lowlatency-lts-utopic?distro=xenial < 4.4.0.165.173
pkg:deb/ubuntu/linux-image-kvm?distro=xenial < 4.4.0.1059.59
pkg:deb/ubuntu/linux-image-generic?distro=xenial < 4.4.0.165.173
pkg:deb/ubuntu/linux-image-generic-lts-xenial?distro=xenial < 4.4.0.165.173
pkg:deb/ubuntu/linux-image-generic-lts-wily?distro=xenial < 4.4.0.165.173
pkg:deb/ubuntu/linux-image-generic-lts-vivid?distro=xenial < 4.4.0.165.173
pkg:deb/ubuntu/linux-image-generic-lts-utopic?distro=xenial < 4.4.0.165.173
pkg:deb/ubuntu/linux-image-generic-lpae?distro=xenial < 4.4.0.165.173
pkg:deb/ubuntu/linux-image-generic-lpae-lts-xenial?distro=xenial < 4.4.0.165.173
pkg:deb/ubuntu/linux-image-generic-lpae-lts-wily?distro=xenial < 4.4.0.165.173
pkg:deb/ubuntu/linux-image-generic-lpae-lts-vivid?distro=xenial < 4.4.0.165.173
pkg:deb/ubuntu/linux-image-generic-lpae-lts-utopic?distro=xenial < 4.4.0.165.173
pkg:deb/ubuntu/linux-image-aws?distro=xenial < 4.4.0.1095.99
pkg:deb/ubuntu/linux-image-4.4.0-165-powerpc64-smp?distro=xenial < 4.4.0-165.193
pkg:deb/ubuntu/linux-image-4.4.0-165-powerpc64-emb?distro=xenial < 4.4.0-165.193
pkg:deb/ubuntu/linux-image-4.4.0-165-powerpc-smp?distro=xenial < 4.4.0-165.193
pkg:deb/ubuntu/linux-image-4.4.0-165-powerpc-e500mc?distro=xenial < 4.4.0-165.193
pkg:deb/ubuntu/linux-image-4.4.0-165-lowlatency?distro=xenial < 4.4.0-165.193
pkg:deb/ubuntu/linux-image-4.4.0-165-generic?distro=xenial < 4.4.0-165.193
pkg:deb/ubuntu/linux-image-4.4.0-165-generic-lpae?distro=xenial < 4.4.0-165.193
pkg:deb/ubuntu/linux-image-4.4.0-1127-snapdragon?distro=xenial < 4.4.0-1127.135
pkg:deb/ubuntu/linux-image-4.4.0-1123-raspi2?distro=xenial < 4.4.0-1123.132
pkg:deb/ubuntu/linux-image-4.4.0-1095-aws?distro=xenial < 4.4.0-1095.106
pkg:deb/ubuntu/linux-image-4.4.0-1059-kvm?distro=xenial < 4.4.0-1059.66
ID
USN-4145-1
Severity
medium
URL
https://ubuntu.com/security/notices/USN-4145-1
Published
2019-10-01T04:12:54
(5 years ago)
Modified
2019-10-01T04:12:54
(5 years ago)
Other Advisories
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:deb/ubuntu/linux-image-virtual?distro=xenial ubuntu linux-image-virtual < 4.4.0.165.173 xenial
Affected pkg:deb/ubuntu/linux-image-virtual-lts-xenial?distro=xenial ubuntu linux-image-virtual-lts-xenial < 4.4.0.165.173 xenial
Affected pkg:deb/ubuntu/linux-image-virtual-lts-wily?distro=xenial ubuntu linux-image-virtual-lts-wily < 4.4.0.165.173 xenial
Affected pkg:deb/ubuntu/linux-image-virtual-lts-vivid?distro=xenial ubuntu linux-image-virtual-lts-vivid < 4.4.0.165.173 xenial
Affected pkg:deb/ubuntu/linux-image-virtual-lts-utopic?distro=xenial ubuntu linux-image-virtual-lts-utopic < 4.4.0.165.173 xenial
Affected pkg:deb/ubuntu/linux-image-snapdragon?distro=xenial ubuntu linux-image-snapdragon < 4.4.0.1127.119 xenial
Affected pkg:deb/ubuntu/linux-image-raspi2?distro=xenial ubuntu linux-image-raspi2 < 4.4.0.1123.123 xenial
Affected pkg:deb/ubuntu/linux-image-powerpc64-smp?distro=xenial ubuntu linux-image-powerpc64-smp < 4.4.0.165.173 xenial
Affected pkg:deb/ubuntu/linux-image-powerpc64-smp-lts-xenial?distro=xenial ubuntu linux-image-powerpc64-smp-lts-xenial < 4.4.0.165.173 xenial
Affected pkg:deb/ubuntu/linux-image-powerpc64-smp-lts-wily?distro=xenial ubuntu linux-image-powerpc64-smp-lts-wily < 4.4.0.165.173 xenial
Affected pkg:deb/ubuntu/linux-image-powerpc64-smp-lts-vivid?distro=xenial ubuntu linux-image-powerpc64-smp-lts-vivid < 4.4.0.165.173 xenial
Affected pkg:deb/ubuntu/linux-image-powerpc64-smp-lts-utopic?distro=xenial ubuntu linux-image-powerpc64-smp-lts-utopic < 4.4.0.165.173 xenial
Affected pkg:deb/ubuntu/linux-image-powerpc64-emb?distro=xenial ubuntu linux-image-powerpc64-emb < 4.4.0.165.173 xenial
Affected pkg:deb/ubuntu/linux-image-powerpc64-emb-lts-xenial?distro=xenial ubuntu linux-image-powerpc64-emb-lts-xenial < 4.4.0.165.173 xenial
Affected pkg:deb/ubuntu/linux-image-powerpc64-emb-lts-wily?distro=xenial ubuntu linux-image-powerpc64-emb-lts-wily < 4.4.0.165.173 xenial
Affected pkg:deb/ubuntu/linux-image-powerpc64-emb-lts-vivid?distro=xenial ubuntu linux-image-powerpc64-emb-lts-vivid < 4.4.0.165.173 xenial
Affected pkg:deb/ubuntu/linux-image-powerpc64-emb-lts-utopic?distro=xenial ubuntu linux-image-powerpc64-emb-lts-utopic < 4.4.0.165.173 xenial
Affected pkg:deb/ubuntu/linux-image-powerpc-smp?distro=xenial ubuntu linux-image-powerpc-smp < 4.4.0.165.173 xenial
Affected pkg:deb/ubuntu/linux-image-powerpc-smp-lts-xenial?distro=xenial ubuntu linux-image-powerpc-smp-lts-xenial < 4.4.0.165.173 xenial
Affected pkg:deb/ubuntu/linux-image-powerpc-smp-lts-wily?distro=xenial ubuntu linux-image-powerpc-smp-lts-wily < 4.4.0.165.173 xenial
Affected pkg:deb/ubuntu/linux-image-powerpc-smp-lts-vivid?distro=xenial ubuntu linux-image-powerpc-smp-lts-vivid < 4.4.0.165.173 xenial
Affected pkg:deb/ubuntu/linux-image-powerpc-smp-lts-utopic?distro=xenial ubuntu linux-image-powerpc-smp-lts-utopic < 4.4.0.165.173 xenial
Affected pkg:deb/ubuntu/linux-image-powerpc-e500mc?distro=xenial ubuntu linux-image-powerpc-e500mc < 4.4.0.165.173 xenial
Affected pkg:deb/ubuntu/linux-image-powerpc-e500mc-lts-xenial?distro=xenial ubuntu linux-image-powerpc-e500mc-lts-xenial < 4.4.0.165.173 xenial
Affected pkg:deb/ubuntu/linux-image-powerpc-e500mc-lts-wily?distro=xenial ubuntu linux-image-powerpc-e500mc-lts-wily < 4.4.0.165.173 xenial
Affected pkg:deb/ubuntu/linux-image-powerpc-e500mc-lts-vivid?distro=xenial ubuntu linux-image-powerpc-e500mc-lts-vivid < 4.4.0.165.173 xenial
Affected pkg:deb/ubuntu/linux-image-powerpc-e500mc-lts-utopic?distro=xenial ubuntu linux-image-powerpc-e500mc-lts-utopic < 4.4.0.165.173 xenial
Affected pkg:deb/ubuntu/linux-image-lowlatency?distro=xenial ubuntu linux-image-lowlatency < 4.4.0.165.173 xenial
Affected pkg:deb/ubuntu/linux-image-lowlatency-lts-xenial?distro=xenial ubuntu linux-image-lowlatency-lts-xenial < 4.4.0.165.173 xenial
Affected pkg:deb/ubuntu/linux-image-lowlatency-lts-wily?distro=xenial ubuntu linux-image-lowlatency-lts-wily < 4.4.0.165.173 xenial
Affected pkg:deb/ubuntu/linux-image-lowlatency-lts-vivid?distro=xenial ubuntu linux-image-lowlatency-lts-vivid < 4.4.0.165.173 xenial
Affected pkg:deb/ubuntu/linux-image-lowlatency-lts-utopic?distro=xenial ubuntu linux-image-lowlatency-lts-utopic < 4.4.0.165.173 xenial
Affected pkg:deb/ubuntu/linux-image-kvm?distro=xenial ubuntu linux-image-kvm < 4.4.0.1059.59 xenial
Affected pkg:deb/ubuntu/linux-image-generic?distro=xenial ubuntu linux-image-generic < 4.4.0.165.173 xenial
Affected pkg:deb/ubuntu/linux-image-generic-lts-xenial?distro=xenial ubuntu linux-image-generic-lts-xenial < 4.4.0.165.173 xenial
Affected pkg:deb/ubuntu/linux-image-generic-lts-wily?distro=xenial ubuntu linux-image-generic-lts-wily < 4.4.0.165.173 xenial
Affected pkg:deb/ubuntu/linux-image-generic-lts-vivid?distro=xenial ubuntu linux-image-generic-lts-vivid < 4.4.0.165.173 xenial
Affected pkg:deb/ubuntu/linux-image-generic-lts-utopic?distro=xenial ubuntu linux-image-generic-lts-utopic < 4.4.0.165.173 xenial
Affected pkg:deb/ubuntu/linux-image-generic-lpae?distro=xenial ubuntu linux-image-generic-lpae < 4.4.0.165.173 xenial
Affected pkg:deb/ubuntu/linux-image-generic-lpae-lts-xenial?distro=xenial ubuntu linux-image-generic-lpae-lts-xenial < 4.4.0.165.173 xenial
Affected pkg:deb/ubuntu/linux-image-generic-lpae-lts-wily?distro=xenial ubuntu linux-image-generic-lpae-lts-wily < 4.4.0.165.173 xenial
Affected pkg:deb/ubuntu/linux-image-generic-lpae-lts-vivid?distro=xenial ubuntu linux-image-generic-lpae-lts-vivid < 4.4.0.165.173 xenial
Affected pkg:deb/ubuntu/linux-image-generic-lpae-lts-utopic?distro=xenial ubuntu linux-image-generic-lpae-lts-utopic < 4.4.0.165.173 xenial
Affected pkg:deb/ubuntu/linux-image-aws?distro=xenial ubuntu linux-image-aws < 4.4.0.1095.99 xenial
Affected pkg:deb/ubuntu/linux-image-4.4.0-165-powerpc64-smp?distro=xenial ubuntu linux-image-4.4.0-165-powerpc64-smp < 4.4.0-165.193 xenial
Affected pkg:deb/ubuntu/linux-image-4.4.0-165-powerpc64-emb?distro=xenial ubuntu linux-image-4.4.0-165-powerpc64-emb < 4.4.0-165.193 xenial
Affected pkg:deb/ubuntu/linux-image-4.4.0-165-powerpc-smp?distro=xenial ubuntu linux-image-4.4.0-165-powerpc-smp < 4.4.0-165.193 xenial
Affected pkg:deb/ubuntu/linux-image-4.4.0-165-powerpc-e500mc?distro=xenial ubuntu linux-image-4.4.0-165-powerpc-e500mc < 4.4.0-165.193 xenial
Affected pkg:deb/ubuntu/linux-image-4.4.0-165-lowlatency?distro=xenial ubuntu linux-image-4.4.0-165-lowlatency < 4.4.0-165.193 xenial
Affected pkg:deb/ubuntu/linux-image-4.4.0-165-generic?distro=xenial ubuntu linux-image-4.4.0-165-generic < 4.4.0-165.193 xenial
Affected pkg:deb/ubuntu/linux-image-4.4.0-165-generic-lpae?distro=xenial ubuntu linux-image-4.4.0-165-generic-lpae < 4.4.0-165.193 xenial
Affected pkg:deb/ubuntu/linux-image-4.4.0-1127-snapdragon?distro=xenial ubuntu linux-image-4.4.0-1127-snapdragon < 4.4.0-1127.135 xenial
Affected pkg:deb/ubuntu/linux-image-4.4.0-1123-raspi2?distro=xenial ubuntu linux-image-4.4.0-1123-raspi2 < 4.4.0-1123.132 xenial
Affected pkg:deb/ubuntu/linux-image-4.4.0-1095-aws?distro=xenial ubuntu linux-image-4.4.0-1095-aws < 4.4.0-1095.106 xenial
Affected pkg:deb/ubuntu/linux-image-4.4.0-1059-kvm?distro=xenial ubuntu linux-image-4.4.0-1059-kvm < 4.4.0-1059.66 xenial
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...