[USN-4254-1] Linux kernel vulnerabilities

Severity Medium
Affected Packages 55
CVEs 9

Several security issues were fixed in the Linux kernel.

It was discovered that the Linux kernel did not properly clear data
structures on context switches for certain Intel graphics processors. A
local attacker could use this to expose sensitive information.
(CVE-2019-14615)

It was discovered that a race condition existed in the Virtual Video Test
Driver in the Linux kernel. An attacker with write access to /dev/video0 on
a system with the vivid module loaded could possibly use this to gain
administrative privileges. (CVE-2019-18683)

It was discovered that the btrfs file system in the Linux kernel did not
properly validate metadata, leading to a NULL pointer dereference. An
attacker could use this to specially craft a file system image that, when
mounted, could cause a denial of service (system crash). (CVE-2019-18885)

It was discovered that multiple memory leaks existed in the Marvell WiFi-Ex
Driver for the Linux kernel. A local attacker could possibly use this to
cause a denial of service (kernel memory exhaustion). (CVE-2019-19057)

It was discovered that the crypto subsystem in the Linux kernel did not
properly deallocate memory in certain error conditions. A local attacker
could use this to cause a denial of service (kernel memory exhaustion).
(CVE-2019-19062)

It was discovered that the Realtek rtlwifi USB device driver in the Linux
kernel did not properly deallocate memory in certain error conditions. A
local attacker could possibly use this to cause a denial of service (kernel
memory exhaustion). (CVE-2019-19063)

Dan Carpenter discovered that the AppleTalk networking subsystem of the
Linux kernel did not properly handle certain error conditions, leading to a
NULL pointer dereference. A local attacker could use this to cause a denial
of service (system crash). (CVE-2019-19227)

It was discovered that the KVM hypervisor implementation in the Linux
kernel did not properly handle ioctl requests to get emulated CPUID
features. An attacker with access to /dev/kvm could use this to cause a
denial of service (system crash). (CVE-2019-19332)

It was discovered that the B2C2 FlexCop USB device driver in the Linux
kernel did not properly validate device metadata. A physically proximate
attacker could use this to cause a denial of service (system crash).
(CVE-2019-15291)

Package Affected Version
pkg:deb/ubuntu/linux-image-virtual?distro=xenial < 4.4.0.173.181
pkg:deb/ubuntu/linux-image-virtual-lts-xenial?distro=xenial < 4.4.0.173.181
pkg:deb/ubuntu/linux-image-virtual-lts-wily?distro=xenial < 4.4.0.173.181
pkg:deb/ubuntu/linux-image-virtual-lts-vivid?distro=xenial < 4.4.0.173.181
pkg:deb/ubuntu/linux-image-virtual-lts-utopic?distro=xenial < 4.4.0.173.181
pkg:deb/ubuntu/linux-image-snapdragon?distro=xenial < 4.4.0.1132.124
pkg:deb/ubuntu/linux-image-raspi2?distro=xenial < 4.4.0.1128.128
pkg:deb/ubuntu/linux-image-powerpc64-smp?distro=xenial < 4.4.0.173.181
pkg:deb/ubuntu/linux-image-powerpc64-smp-lts-xenial?distro=xenial < 4.4.0.173.181
pkg:deb/ubuntu/linux-image-powerpc64-smp-lts-wily?distro=xenial < 4.4.0.173.181
pkg:deb/ubuntu/linux-image-powerpc64-smp-lts-vivid?distro=xenial < 4.4.0.173.181
pkg:deb/ubuntu/linux-image-powerpc64-smp-lts-utopic?distro=xenial < 4.4.0.173.181
pkg:deb/ubuntu/linux-image-powerpc64-emb?distro=xenial < 4.4.0.173.181
pkg:deb/ubuntu/linux-image-powerpc64-emb-lts-xenial?distro=xenial < 4.4.0.173.181
pkg:deb/ubuntu/linux-image-powerpc64-emb-lts-wily?distro=xenial < 4.4.0.173.181
pkg:deb/ubuntu/linux-image-powerpc64-emb-lts-vivid?distro=xenial < 4.4.0.173.181
pkg:deb/ubuntu/linux-image-powerpc64-emb-lts-utopic?distro=xenial < 4.4.0.173.181
pkg:deb/ubuntu/linux-image-powerpc-smp?distro=xenial < 4.4.0.173.181
pkg:deb/ubuntu/linux-image-powerpc-smp-lts-xenial?distro=xenial < 4.4.0.173.181
pkg:deb/ubuntu/linux-image-powerpc-smp-lts-wily?distro=xenial < 4.4.0.173.181
pkg:deb/ubuntu/linux-image-powerpc-smp-lts-vivid?distro=xenial < 4.4.0.173.181
pkg:deb/ubuntu/linux-image-powerpc-smp-lts-utopic?distro=xenial < 4.4.0.173.181
pkg:deb/ubuntu/linux-image-powerpc-e500mc?distro=xenial < 4.4.0.173.181
pkg:deb/ubuntu/linux-image-powerpc-e500mc-lts-xenial?distro=xenial < 4.4.0.173.181
pkg:deb/ubuntu/linux-image-powerpc-e500mc-lts-wily?distro=xenial < 4.4.0.173.181
pkg:deb/ubuntu/linux-image-powerpc-e500mc-lts-vivid?distro=xenial < 4.4.0.173.181
pkg:deb/ubuntu/linux-image-powerpc-e500mc-lts-utopic?distro=xenial < 4.4.0.173.181
pkg:deb/ubuntu/linux-image-lowlatency?distro=xenial < 4.4.0.173.181
pkg:deb/ubuntu/linux-image-lowlatency-lts-xenial?distro=xenial < 4.4.0.173.181
pkg:deb/ubuntu/linux-image-lowlatency-lts-wily?distro=xenial < 4.4.0.173.181
pkg:deb/ubuntu/linux-image-lowlatency-lts-vivid?distro=xenial < 4.4.0.173.181
pkg:deb/ubuntu/linux-image-lowlatency-lts-utopic?distro=xenial < 4.4.0.173.181
pkg:deb/ubuntu/linux-image-kvm?distro=xenial < 4.4.0.1065.65
pkg:deb/ubuntu/linux-image-generic?distro=xenial < 4.4.0.173.181
pkg:deb/ubuntu/linux-image-generic-lts-xenial?distro=xenial < 4.4.0.173.181
pkg:deb/ubuntu/linux-image-generic-lts-wily?distro=xenial < 4.4.0.173.181
pkg:deb/ubuntu/linux-image-generic-lts-vivid?distro=xenial < 4.4.0.173.181
pkg:deb/ubuntu/linux-image-generic-lts-utopic?distro=xenial < 4.4.0.173.181
pkg:deb/ubuntu/linux-image-generic-lpae?distro=xenial < 4.4.0.173.181
pkg:deb/ubuntu/linux-image-generic-lpae-lts-xenial?distro=xenial < 4.4.0.173.181
pkg:deb/ubuntu/linux-image-generic-lpae-lts-wily?distro=xenial < 4.4.0.173.181
pkg:deb/ubuntu/linux-image-generic-lpae-lts-vivid?distro=xenial < 4.4.0.173.181
pkg:deb/ubuntu/linux-image-generic-lpae-lts-utopic?distro=xenial < 4.4.0.173.181
pkg:deb/ubuntu/linux-image-aws?distro=xenial < 4.4.0.1101.105
pkg:deb/ubuntu/linux-image-4.4.0-173-powerpc64-smp?distro=xenial < 4.4.0-173.203
pkg:deb/ubuntu/linux-image-4.4.0-173-powerpc64-emb?distro=xenial < 4.4.0-173.203
pkg:deb/ubuntu/linux-image-4.4.0-173-powerpc-smp?distro=xenial < 4.4.0-173.203
pkg:deb/ubuntu/linux-image-4.4.0-173-powerpc-e500mc?distro=xenial < 4.4.0-173.203
pkg:deb/ubuntu/linux-image-4.4.0-173-lowlatency?distro=xenial < 4.4.0-173.203
pkg:deb/ubuntu/linux-image-4.4.0-173-generic?distro=xenial < 4.4.0-173.203
pkg:deb/ubuntu/linux-image-4.4.0-173-generic-lpae?distro=xenial < 4.4.0-173.203
pkg:deb/ubuntu/linux-image-4.4.0-1132-snapdragon?distro=xenial < 4.4.0-1132.140
pkg:deb/ubuntu/linux-image-4.4.0-1128-raspi2?distro=xenial < 4.4.0-1128.137
pkg:deb/ubuntu/linux-image-4.4.0-1101-aws?distro=xenial < 4.4.0-1101.112
pkg:deb/ubuntu/linux-image-4.4.0-1065-kvm?distro=xenial < 4.4.0-1065.72
ID
USN-4254-1
Severity
medium
URL
https://ubuntu.com/security/notices/USN-4254-1
Published
2020-01-28T03:27:15
(4 years ago)
Modified
2020-01-28T03:27:15
(4 years ago)
Other Advisories
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:deb/ubuntu/linux-image-virtual?distro=xenial ubuntu linux-image-virtual < 4.4.0.173.181 xenial
Affected pkg:deb/ubuntu/linux-image-virtual-lts-xenial?distro=xenial ubuntu linux-image-virtual-lts-xenial < 4.4.0.173.181 xenial
Affected pkg:deb/ubuntu/linux-image-virtual-lts-wily?distro=xenial ubuntu linux-image-virtual-lts-wily < 4.4.0.173.181 xenial
Affected pkg:deb/ubuntu/linux-image-virtual-lts-vivid?distro=xenial ubuntu linux-image-virtual-lts-vivid < 4.4.0.173.181 xenial
Affected pkg:deb/ubuntu/linux-image-virtual-lts-utopic?distro=xenial ubuntu linux-image-virtual-lts-utopic < 4.4.0.173.181 xenial
Affected pkg:deb/ubuntu/linux-image-snapdragon?distro=xenial ubuntu linux-image-snapdragon < 4.4.0.1132.124 xenial
Affected pkg:deb/ubuntu/linux-image-raspi2?distro=xenial ubuntu linux-image-raspi2 < 4.4.0.1128.128 xenial
Affected pkg:deb/ubuntu/linux-image-powerpc64-smp?distro=xenial ubuntu linux-image-powerpc64-smp < 4.4.0.173.181 xenial
Affected pkg:deb/ubuntu/linux-image-powerpc64-smp-lts-xenial?distro=xenial ubuntu linux-image-powerpc64-smp-lts-xenial < 4.4.0.173.181 xenial
Affected pkg:deb/ubuntu/linux-image-powerpc64-smp-lts-wily?distro=xenial ubuntu linux-image-powerpc64-smp-lts-wily < 4.4.0.173.181 xenial
Affected pkg:deb/ubuntu/linux-image-powerpc64-smp-lts-vivid?distro=xenial ubuntu linux-image-powerpc64-smp-lts-vivid < 4.4.0.173.181 xenial
Affected pkg:deb/ubuntu/linux-image-powerpc64-smp-lts-utopic?distro=xenial ubuntu linux-image-powerpc64-smp-lts-utopic < 4.4.0.173.181 xenial
Affected pkg:deb/ubuntu/linux-image-powerpc64-emb?distro=xenial ubuntu linux-image-powerpc64-emb < 4.4.0.173.181 xenial
Affected pkg:deb/ubuntu/linux-image-powerpc64-emb-lts-xenial?distro=xenial ubuntu linux-image-powerpc64-emb-lts-xenial < 4.4.0.173.181 xenial
Affected pkg:deb/ubuntu/linux-image-powerpc64-emb-lts-wily?distro=xenial ubuntu linux-image-powerpc64-emb-lts-wily < 4.4.0.173.181 xenial
Affected pkg:deb/ubuntu/linux-image-powerpc64-emb-lts-vivid?distro=xenial ubuntu linux-image-powerpc64-emb-lts-vivid < 4.4.0.173.181 xenial
Affected pkg:deb/ubuntu/linux-image-powerpc64-emb-lts-utopic?distro=xenial ubuntu linux-image-powerpc64-emb-lts-utopic < 4.4.0.173.181 xenial
Affected pkg:deb/ubuntu/linux-image-powerpc-smp?distro=xenial ubuntu linux-image-powerpc-smp < 4.4.0.173.181 xenial
Affected pkg:deb/ubuntu/linux-image-powerpc-smp-lts-xenial?distro=xenial ubuntu linux-image-powerpc-smp-lts-xenial < 4.4.0.173.181 xenial
Affected pkg:deb/ubuntu/linux-image-powerpc-smp-lts-wily?distro=xenial ubuntu linux-image-powerpc-smp-lts-wily < 4.4.0.173.181 xenial
Affected pkg:deb/ubuntu/linux-image-powerpc-smp-lts-vivid?distro=xenial ubuntu linux-image-powerpc-smp-lts-vivid < 4.4.0.173.181 xenial
Affected pkg:deb/ubuntu/linux-image-powerpc-smp-lts-utopic?distro=xenial ubuntu linux-image-powerpc-smp-lts-utopic < 4.4.0.173.181 xenial
Affected pkg:deb/ubuntu/linux-image-powerpc-e500mc?distro=xenial ubuntu linux-image-powerpc-e500mc < 4.4.0.173.181 xenial
Affected pkg:deb/ubuntu/linux-image-powerpc-e500mc-lts-xenial?distro=xenial ubuntu linux-image-powerpc-e500mc-lts-xenial < 4.4.0.173.181 xenial
Affected pkg:deb/ubuntu/linux-image-powerpc-e500mc-lts-wily?distro=xenial ubuntu linux-image-powerpc-e500mc-lts-wily < 4.4.0.173.181 xenial
Affected pkg:deb/ubuntu/linux-image-powerpc-e500mc-lts-vivid?distro=xenial ubuntu linux-image-powerpc-e500mc-lts-vivid < 4.4.0.173.181 xenial
Affected pkg:deb/ubuntu/linux-image-powerpc-e500mc-lts-utopic?distro=xenial ubuntu linux-image-powerpc-e500mc-lts-utopic < 4.4.0.173.181 xenial
Affected pkg:deb/ubuntu/linux-image-lowlatency?distro=xenial ubuntu linux-image-lowlatency < 4.4.0.173.181 xenial
Affected pkg:deb/ubuntu/linux-image-lowlatency-lts-xenial?distro=xenial ubuntu linux-image-lowlatency-lts-xenial < 4.4.0.173.181 xenial
Affected pkg:deb/ubuntu/linux-image-lowlatency-lts-wily?distro=xenial ubuntu linux-image-lowlatency-lts-wily < 4.4.0.173.181 xenial
Affected pkg:deb/ubuntu/linux-image-lowlatency-lts-vivid?distro=xenial ubuntu linux-image-lowlatency-lts-vivid < 4.4.0.173.181 xenial
Affected pkg:deb/ubuntu/linux-image-lowlatency-lts-utopic?distro=xenial ubuntu linux-image-lowlatency-lts-utopic < 4.4.0.173.181 xenial
Affected pkg:deb/ubuntu/linux-image-kvm?distro=xenial ubuntu linux-image-kvm < 4.4.0.1065.65 xenial
Affected pkg:deb/ubuntu/linux-image-generic?distro=xenial ubuntu linux-image-generic < 4.4.0.173.181 xenial
Affected pkg:deb/ubuntu/linux-image-generic-lts-xenial?distro=xenial ubuntu linux-image-generic-lts-xenial < 4.4.0.173.181 xenial
Affected pkg:deb/ubuntu/linux-image-generic-lts-wily?distro=xenial ubuntu linux-image-generic-lts-wily < 4.4.0.173.181 xenial
Affected pkg:deb/ubuntu/linux-image-generic-lts-vivid?distro=xenial ubuntu linux-image-generic-lts-vivid < 4.4.0.173.181 xenial
Affected pkg:deb/ubuntu/linux-image-generic-lts-utopic?distro=xenial ubuntu linux-image-generic-lts-utopic < 4.4.0.173.181 xenial
Affected pkg:deb/ubuntu/linux-image-generic-lpae?distro=xenial ubuntu linux-image-generic-lpae < 4.4.0.173.181 xenial
Affected pkg:deb/ubuntu/linux-image-generic-lpae-lts-xenial?distro=xenial ubuntu linux-image-generic-lpae-lts-xenial < 4.4.0.173.181 xenial
Affected pkg:deb/ubuntu/linux-image-generic-lpae-lts-wily?distro=xenial ubuntu linux-image-generic-lpae-lts-wily < 4.4.0.173.181 xenial
Affected pkg:deb/ubuntu/linux-image-generic-lpae-lts-vivid?distro=xenial ubuntu linux-image-generic-lpae-lts-vivid < 4.4.0.173.181 xenial
Affected pkg:deb/ubuntu/linux-image-generic-lpae-lts-utopic?distro=xenial ubuntu linux-image-generic-lpae-lts-utopic < 4.4.0.173.181 xenial
Affected pkg:deb/ubuntu/linux-image-aws?distro=xenial ubuntu linux-image-aws < 4.4.0.1101.105 xenial
Affected pkg:deb/ubuntu/linux-image-4.4.0-173-powerpc64-smp?distro=xenial ubuntu linux-image-4.4.0-173-powerpc64-smp < 4.4.0-173.203 xenial
Affected pkg:deb/ubuntu/linux-image-4.4.0-173-powerpc64-emb?distro=xenial ubuntu linux-image-4.4.0-173-powerpc64-emb < 4.4.0-173.203 xenial
Affected pkg:deb/ubuntu/linux-image-4.4.0-173-powerpc-smp?distro=xenial ubuntu linux-image-4.4.0-173-powerpc-smp < 4.4.0-173.203 xenial
Affected pkg:deb/ubuntu/linux-image-4.4.0-173-powerpc-e500mc?distro=xenial ubuntu linux-image-4.4.0-173-powerpc-e500mc < 4.4.0-173.203 xenial
Affected pkg:deb/ubuntu/linux-image-4.4.0-173-lowlatency?distro=xenial ubuntu linux-image-4.4.0-173-lowlatency < 4.4.0-173.203 xenial
Affected pkg:deb/ubuntu/linux-image-4.4.0-173-generic?distro=xenial ubuntu linux-image-4.4.0-173-generic < 4.4.0-173.203 xenial
Affected pkg:deb/ubuntu/linux-image-4.4.0-173-generic-lpae?distro=xenial ubuntu linux-image-4.4.0-173-generic-lpae < 4.4.0-173.203 xenial
Affected pkg:deb/ubuntu/linux-image-4.4.0-1132-snapdragon?distro=xenial ubuntu linux-image-4.4.0-1132-snapdragon < 4.4.0-1132.140 xenial
Affected pkg:deb/ubuntu/linux-image-4.4.0-1128-raspi2?distro=xenial ubuntu linux-image-4.4.0-1128-raspi2 < 4.4.0-1128.137 xenial
Affected pkg:deb/ubuntu/linux-image-4.4.0-1101-aws?distro=xenial ubuntu linux-image-4.4.0-1101-aws < 4.4.0-1101.112 xenial
Affected pkg:deb/ubuntu/linux-image-4.4.0-1065-kvm?distro=xenial ubuntu linux-image-4.4.0-1065-kvm < 4.4.0-1065.72 xenial
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...