[USN-4163-1] Linux kernel vulnerabilities

Severity Medium
Affected Packages 55
CVEs 10

Several security issues were fixed in the Linux kernel.

It was discovered that a race condition existed in the ARC EMAC ethernet
driver for the Linux kernel, resulting in a use-after-free vulnerability.
An attacker could use this to cause a denial of service (system crash).
(CVE-2016-10906)

It was discovered that a race condition existed in the Serial Attached SCSI
(SAS) implementation in the Linux kernel when handling certain error
conditions. A local attacker could use this to cause a denial of service
(kernel deadlock). (CVE-2017-18232)

It was discovered that the RSI 91x Wi-Fi driver in the Linux kernel did not
did not handle detach operations correctly, leading to a use-after-free
vulnerability. A physically proximate attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2018-21008)

Wen Huang discovered that the Marvell Wi-Fi device driver in the Linux
kernel did not properly perform bounds checking, leading to a heap
overflow. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2019-14814,
CVE-2019-14816)

Matt Delco discovered that the KVM hypervisor implementation in the Linux
kernel did not properly perform bounds checking when handling coalesced
MMIO write operations. A local attacker with write access to /dev/kvm could
use this to cause a denial of service (system crash). (CVE-2019-14821)

Hui Peng and Mathias Payer discovered that the USB audio driver for the
Linux kernel did not properly validate device meta data. A physically
proximate attacker could use this to cause a denial of service (system
crash). (CVE-2019-15117)

Hui Peng and Mathias Payer discovered that the USB audio driver for the
Linux kernel improperly performed recursion while handling device meta
data. A physically proximate attacker could use this to cause a denial of
service (system crash). (CVE-2019-15118)

It was discovered that the Technisat DVB-S/S2 USB device driver in the
Linux kernel contained a buffer overread. A physically proximate attacker
could use this to cause a denial of service (system crash) or possibly
expose sensitive information. (CVE-2019-15505)

Brad Spengler discovered that a Spectre mitigation was improperly
implemented in the ptrace susbsystem of the Linux kernel. A local attacker
could possibly use this to expose sensitive information. (CVE-2019-15902)

Package Affected Version
pkg:deb/ubuntu/linux-image-virtual?distro=xenial < 4.4.0.166.174
pkg:deb/ubuntu/linux-image-virtual-lts-xenial?distro=xenial < 4.4.0.166.174
pkg:deb/ubuntu/linux-image-virtual-lts-wily?distro=xenial < 4.4.0.166.174
pkg:deb/ubuntu/linux-image-virtual-lts-vivid?distro=xenial < 4.4.0.166.174
pkg:deb/ubuntu/linux-image-virtual-lts-utopic?distro=xenial < 4.4.0.166.174
pkg:deb/ubuntu/linux-image-snapdragon?distro=xenial < 4.4.0.1128.120
pkg:deb/ubuntu/linux-image-raspi2?distro=xenial < 4.4.0.1124.124
pkg:deb/ubuntu/linux-image-powerpc64-smp?distro=xenial < 4.4.0.166.174
pkg:deb/ubuntu/linux-image-powerpc64-smp-lts-xenial?distro=xenial < 4.4.0.166.174
pkg:deb/ubuntu/linux-image-powerpc64-smp-lts-wily?distro=xenial < 4.4.0.166.174
pkg:deb/ubuntu/linux-image-powerpc64-smp-lts-vivid?distro=xenial < 4.4.0.166.174
pkg:deb/ubuntu/linux-image-powerpc64-smp-lts-utopic?distro=xenial < 4.4.0.166.174
pkg:deb/ubuntu/linux-image-powerpc64-emb?distro=xenial < 4.4.0.166.174
pkg:deb/ubuntu/linux-image-powerpc64-emb-lts-xenial?distro=xenial < 4.4.0.166.174
pkg:deb/ubuntu/linux-image-powerpc64-emb-lts-wily?distro=xenial < 4.4.0.166.174
pkg:deb/ubuntu/linux-image-powerpc64-emb-lts-vivid?distro=xenial < 4.4.0.166.174
pkg:deb/ubuntu/linux-image-powerpc64-emb-lts-utopic?distro=xenial < 4.4.0.166.174
pkg:deb/ubuntu/linux-image-powerpc-smp?distro=xenial < 4.4.0.166.174
pkg:deb/ubuntu/linux-image-powerpc-smp-lts-xenial?distro=xenial < 4.4.0.166.174
pkg:deb/ubuntu/linux-image-powerpc-smp-lts-wily?distro=xenial < 4.4.0.166.174
pkg:deb/ubuntu/linux-image-powerpc-smp-lts-vivid?distro=xenial < 4.4.0.166.174
pkg:deb/ubuntu/linux-image-powerpc-smp-lts-utopic?distro=xenial < 4.4.0.166.174
pkg:deb/ubuntu/linux-image-powerpc-e500mc?distro=xenial < 4.4.0.166.174
pkg:deb/ubuntu/linux-image-powerpc-e500mc-lts-xenial?distro=xenial < 4.4.0.166.174
pkg:deb/ubuntu/linux-image-powerpc-e500mc-lts-wily?distro=xenial < 4.4.0.166.174
pkg:deb/ubuntu/linux-image-powerpc-e500mc-lts-vivid?distro=xenial < 4.4.0.166.174
pkg:deb/ubuntu/linux-image-powerpc-e500mc-lts-utopic?distro=xenial < 4.4.0.166.174
pkg:deb/ubuntu/linux-image-lowlatency?distro=xenial < 4.4.0.166.174
pkg:deb/ubuntu/linux-image-lowlatency-lts-xenial?distro=xenial < 4.4.0.166.174
pkg:deb/ubuntu/linux-image-lowlatency-lts-wily?distro=xenial < 4.4.0.166.174
pkg:deb/ubuntu/linux-image-lowlatency-lts-vivid?distro=xenial < 4.4.0.166.174
pkg:deb/ubuntu/linux-image-lowlatency-lts-utopic?distro=xenial < 4.4.0.166.174
pkg:deb/ubuntu/linux-image-kvm?distro=xenial < 4.4.0.1060.60
pkg:deb/ubuntu/linux-image-generic?distro=xenial < 4.4.0.166.174
pkg:deb/ubuntu/linux-image-generic-lts-xenial?distro=xenial < 4.4.0.166.174
pkg:deb/ubuntu/linux-image-generic-lts-wily?distro=xenial < 4.4.0.166.174
pkg:deb/ubuntu/linux-image-generic-lts-vivid?distro=xenial < 4.4.0.166.174
pkg:deb/ubuntu/linux-image-generic-lts-utopic?distro=xenial < 4.4.0.166.174
pkg:deb/ubuntu/linux-image-generic-lpae?distro=xenial < 4.4.0.166.174
pkg:deb/ubuntu/linux-image-generic-lpae-lts-xenial?distro=xenial < 4.4.0.166.174
pkg:deb/ubuntu/linux-image-generic-lpae-lts-wily?distro=xenial < 4.4.0.166.174
pkg:deb/ubuntu/linux-image-generic-lpae-lts-vivid?distro=xenial < 4.4.0.166.174
pkg:deb/ubuntu/linux-image-generic-lpae-lts-utopic?distro=xenial < 4.4.0.166.174
pkg:deb/ubuntu/linux-image-aws?distro=xenial < 4.4.0.1096.100
pkg:deb/ubuntu/linux-image-4.4.0-166-powerpc64-smp?distro=xenial < 4.4.0-166.195
pkg:deb/ubuntu/linux-image-4.4.0-166-powerpc64-emb?distro=xenial < 4.4.0-166.195
pkg:deb/ubuntu/linux-image-4.4.0-166-powerpc-smp?distro=xenial < 4.4.0-166.195
pkg:deb/ubuntu/linux-image-4.4.0-166-powerpc-e500mc?distro=xenial < 4.4.0-166.195
pkg:deb/ubuntu/linux-image-4.4.0-166-lowlatency?distro=xenial < 4.4.0-166.195
pkg:deb/ubuntu/linux-image-4.4.0-166-generic?distro=xenial < 4.4.0-166.195
pkg:deb/ubuntu/linux-image-4.4.0-166-generic-lpae?distro=xenial < 4.4.0-166.195
pkg:deb/ubuntu/linux-image-4.4.0-1128-snapdragon?distro=xenial < 4.4.0-1128.136
pkg:deb/ubuntu/linux-image-4.4.0-1124-raspi2?distro=xenial < 4.4.0-1124.133
pkg:deb/ubuntu/linux-image-4.4.0-1096-aws?distro=xenial < 4.4.0-1096.107
pkg:deb/ubuntu/linux-image-4.4.0-1060-kvm?distro=xenial < 4.4.0-1060.67
ID
USN-4163-1
Severity
medium
URL
https://ubuntu.com/security/notices/USN-4163-1
Published
2019-10-22T02:40:54
(4 years ago)
Modified
2019-10-22T02:40:54
(4 years ago)
Other Advisories
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:deb/ubuntu/linux-image-virtual?distro=xenial ubuntu linux-image-virtual < 4.4.0.166.174 xenial
Affected pkg:deb/ubuntu/linux-image-virtual-lts-xenial?distro=xenial ubuntu linux-image-virtual-lts-xenial < 4.4.0.166.174 xenial
Affected pkg:deb/ubuntu/linux-image-virtual-lts-wily?distro=xenial ubuntu linux-image-virtual-lts-wily < 4.4.0.166.174 xenial
Affected pkg:deb/ubuntu/linux-image-virtual-lts-vivid?distro=xenial ubuntu linux-image-virtual-lts-vivid < 4.4.0.166.174 xenial
Affected pkg:deb/ubuntu/linux-image-virtual-lts-utopic?distro=xenial ubuntu linux-image-virtual-lts-utopic < 4.4.0.166.174 xenial
Affected pkg:deb/ubuntu/linux-image-snapdragon?distro=xenial ubuntu linux-image-snapdragon < 4.4.0.1128.120 xenial
Affected pkg:deb/ubuntu/linux-image-raspi2?distro=xenial ubuntu linux-image-raspi2 < 4.4.0.1124.124 xenial
Affected pkg:deb/ubuntu/linux-image-powerpc64-smp?distro=xenial ubuntu linux-image-powerpc64-smp < 4.4.0.166.174 xenial
Affected pkg:deb/ubuntu/linux-image-powerpc64-smp-lts-xenial?distro=xenial ubuntu linux-image-powerpc64-smp-lts-xenial < 4.4.0.166.174 xenial
Affected pkg:deb/ubuntu/linux-image-powerpc64-smp-lts-wily?distro=xenial ubuntu linux-image-powerpc64-smp-lts-wily < 4.4.0.166.174 xenial
Affected pkg:deb/ubuntu/linux-image-powerpc64-smp-lts-vivid?distro=xenial ubuntu linux-image-powerpc64-smp-lts-vivid < 4.4.0.166.174 xenial
Affected pkg:deb/ubuntu/linux-image-powerpc64-smp-lts-utopic?distro=xenial ubuntu linux-image-powerpc64-smp-lts-utopic < 4.4.0.166.174 xenial
Affected pkg:deb/ubuntu/linux-image-powerpc64-emb?distro=xenial ubuntu linux-image-powerpc64-emb < 4.4.0.166.174 xenial
Affected pkg:deb/ubuntu/linux-image-powerpc64-emb-lts-xenial?distro=xenial ubuntu linux-image-powerpc64-emb-lts-xenial < 4.4.0.166.174 xenial
Affected pkg:deb/ubuntu/linux-image-powerpc64-emb-lts-wily?distro=xenial ubuntu linux-image-powerpc64-emb-lts-wily < 4.4.0.166.174 xenial
Affected pkg:deb/ubuntu/linux-image-powerpc64-emb-lts-vivid?distro=xenial ubuntu linux-image-powerpc64-emb-lts-vivid < 4.4.0.166.174 xenial
Affected pkg:deb/ubuntu/linux-image-powerpc64-emb-lts-utopic?distro=xenial ubuntu linux-image-powerpc64-emb-lts-utopic < 4.4.0.166.174 xenial
Affected pkg:deb/ubuntu/linux-image-powerpc-smp?distro=xenial ubuntu linux-image-powerpc-smp < 4.4.0.166.174 xenial
Affected pkg:deb/ubuntu/linux-image-powerpc-smp-lts-xenial?distro=xenial ubuntu linux-image-powerpc-smp-lts-xenial < 4.4.0.166.174 xenial
Affected pkg:deb/ubuntu/linux-image-powerpc-smp-lts-wily?distro=xenial ubuntu linux-image-powerpc-smp-lts-wily < 4.4.0.166.174 xenial
Affected pkg:deb/ubuntu/linux-image-powerpc-smp-lts-vivid?distro=xenial ubuntu linux-image-powerpc-smp-lts-vivid < 4.4.0.166.174 xenial
Affected pkg:deb/ubuntu/linux-image-powerpc-smp-lts-utopic?distro=xenial ubuntu linux-image-powerpc-smp-lts-utopic < 4.4.0.166.174 xenial
Affected pkg:deb/ubuntu/linux-image-powerpc-e500mc?distro=xenial ubuntu linux-image-powerpc-e500mc < 4.4.0.166.174 xenial
Affected pkg:deb/ubuntu/linux-image-powerpc-e500mc-lts-xenial?distro=xenial ubuntu linux-image-powerpc-e500mc-lts-xenial < 4.4.0.166.174 xenial
Affected pkg:deb/ubuntu/linux-image-powerpc-e500mc-lts-wily?distro=xenial ubuntu linux-image-powerpc-e500mc-lts-wily < 4.4.0.166.174 xenial
Affected pkg:deb/ubuntu/linux-image-powerpc-e500mc-lts-vivid?distro=xenial ubuntu linux-image-powerpc-e500mc-lts-vivid < 4.4.0.166.174 xenial
Affected pkg:deb/ubuntu/linux-image-powerpc-e500mc-lts-utopic?distro=xenial ubuntu linux-image-powerpc-e500mc-lts-utopic < 4.4.0.166.174 xenial
Affected pkg:deb/ubuntu/linux-image-lowlatency?distro=xenial ubuntu linux-image-lowlatency < 4.4.0.166.174 xenial
Affected pkg:deb/ubuntu/linux-image-lowlatency-lts-xenial?distro=xenial ubuntu linux-image-lowlatency-lts-xenial < 4.4.0.166.174 xenial
Affected pkg:deb/ubuntu/linux-image-lowlatency-lts-wily?distro=xenial ubuntu linux-image-lowlatency-lts-wily < 4.4.0.166.174 xenial
Affected pkg:deb/ubuntu/linux-image-lowlatency-lts-vivid?distro=xenial ubuntu linux-image-lowlatency-lts-vivid < 4.4.0.166.174 xenial
Affected pkg:deb/ubuntu/linux-image-lowlatency-lts-utopic?distro=xenial ubuntu linux-image-lowlatency-lts-utopic < 4.4.0.166.174 xenial
Affected pkg:deb/ubuntu/linux-image-kvm?distro=xenial ubuntu linux-image-kvm < 4.4.0.1060.60 xenial
Affected pkg:deb/ubuntu/linux-image-generic?distro=xenial ubuntu linux-image-generic < 4.4.0.166.174 xenial
Affected pkg:deb/ubuntu/linux-image-generic-lts-xenial?distro=xenial ubuntu linux-image-generic-lts-xenial < 4.4.0.166.174 xenial
Affected pkg:deb/ubuntu/linux-image-generic-lts-wily?distro=xenial ubuntu linux-image-generic-lts-wily < 4.4.0.166.174 xenial
Affected pkg:deb/ubuntu/linux-image-generic-lts-vivid?distro=xenial ubuntu linux-image-generic-lts-vivid < 4.4.0.166.174 xenial
Affected pkg:deb/ubuntu/linux-image-generic-lts-utopic?distro=xenial ubuntu linux-image-generic-lts-utopic < 4.4.0.166.174 xenial
Affected pkg:deb/ubuntu/linux-image-generic-lpae?distro=xenial ubuntu linux-image-generic-lpae < 4.4.0.166.174 xenial
Affected pkg:deb/ubuntu/linux-image-generic-lpae-lts-xenial?distro=xenial ubuntu linux-image-generic-lpae-lts-xenial < 4.4.0.166.174 xenial
Affected pkg:deb/ubuntu/linux-image-generic-lpae-lts-wily?distro=xenial ubuntu linux-image-generic-lpae-lts-wily < 4.4.0.166.174 xenial
Affected pkg:deb/ubuntu/linux-image-generic-lpae-lts-vivid?distro=xenial ubuntu linux-image-generic-lpae-lts-vivid < 4.4.0.166.174 xenial
Affected pkg:deb/ubuntu/linux-image-generic-lpae-lts-utopic?distro=xenial ubuntu linux-image-generic-lpae-lts-utopic < 4.4.0.166.174 xenial
Affected pkg:deb/ubuntu/linux-image-aws?distro=xenial ubuntu linux-image-aws < 4.4.0.1096.100 xenial
Affected pkg:deb/ubuntu/linux-image-4.4.0-166-powerpc64-smp?distro=xenial ubuntu linux-image-4.4.0-166-powerpc64-smp < 4.4.0-166.195 xenial
Affected pkg:deb/ubuntu/linux-image-4.4.0-166-powerpc64-emb?distro=xenial ubuntu linux-image-4.4.0-166-powerpc64-emb < 4.4.0-166.195 xenial
Affected pkg:deb/ubuntu/linux-image-4.4.0-166-powerpc-smp?distro=xenial ubuntu linux-image-4.4.0-166-powerpc-smp < 4.4.0-166.195 xenial
Affected pkg:deb/ubuntu/linux-image-4.4.0-166-powerpc-e500mc?distro=xenial ubuntu linux-image-4.4.0-166-powerpc-e500mc < 4.4.0-166.195 xenial
Affected pkg:deb/ubuntu/linux-image-4.4.0-166-lowlatency?distro=xenial ubuntu linux-image-4.4.0-166-lowlatency < 4.4.0-166.195 xenial
Affected pkg:deb/ubuntu/linux-image-4.4.0-166-generic?distro=xenial ubuntu linux-image-4.4.0-166-generic < 4.4.0-166.195 xenial
Affected pkg:deb/ubuntu/linux-image-4.4.0-166-generic-lpae?distro=xenial ubuntu linux-image-4.4.0-166-generic-lpae < 4.4.0-166.195 xenial
Affected pkg:deb/ubuntu/linux-image-4.4.0-1128-snapdragon?distro=xenial ubuntu linux-image-4.4.0-1128-snapdragon < 4.4.0-1128.136 xenial
Affected pkg:deb/ubuntu/linux-image-4.4.0-1124-raspi2?distro=xenial ubuntu linux-image-4.4.0-1124-raspi2 < 4.4.0-1124.133 xenial
Affected pkg:deb/ubuntu/linux-image-4.4.0-1096-aws?distro=xenial ubuntu linux-image-4.4.0-1096-aws < 4.4.0-1096.107 xenial
Affected pkg:deb/ubuntu/linux-image-4.4.0-1060-kvm?distro=xenial ubuntu linux-image-4.4.0-1060-kvm < 4.4.0-1060.67 xenial
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...