[USN-4318-1] Linux kernel vulnerabilities
Several security issues were fixed in the Linux kernel.
Al Viro discovered that the vfs layer in the Linux kernel contained a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly expose sensitive information (kernel
memory). (CVE-2020-8428)
Gustavo Romero and Paul Mackerras discovered that the KVM implementation in
the Linux kernel for PowerPC processors did not properly keep guest state
separate from host state. A local attacker in a KVM guest could use this to
cause a denial of service (host system crash). (CVE-2020-8834)
Shijie Luo discovered that the ext4 file system implementation in the Linux
kernel did not properly check for a too-large journal size. An attacker
could use this to construct a malicious ext4 image that, when mounted,
could cause a denial of service (soft lockup). (CVE-2020-8992)
- ID
- USN-4318-1
- Severity
- medium
- URL
- https://ubuntu.com/security/notices/USN-4318-1
- Published
-
2020-04-06T20:29:11
(4 years ago) - Modified
-
2020-04-06T20:29:11
(4 years ago) - Other Advisories
-
- DSA-4667-1
- DSA-4698-1
- ELSA-2020-5663
- MS:CVE-2020-8428
- MS:CVE-2020-8992
- openSUSE-SU-2020:0336-1
- openSUSE-SU-2020:0543-1
- SUSE-SU-2020:0511-1
- SUSE-SU-2020:0558-1
- SUSE-SU-2020:0559-1
- SUSE-SU-2020:0560-1
- SUSE-SU-2020:0580-1
- SUSE-SU-2020:0584-1
- SUSE-SU-2020:0613-1
- SUSE-SU-2020:0649-1
- SUSE-SU-2020:0667-1
- SUSE-SU-2020:0688-1
- SUSE-SU-2020:1084-1
- SUSE-SU-2020:1085-1
- SUSE-SU-2020:1087-1
- SUSE-SU-2020:1118-1
- SUSE-SU-2020:1119-1
- SUSE-SU-2020:1123-1
- SUSE-SU-2020:1141-1
- SUSE-SU-2020:1142-1
- SUSE-SU-2020:1146-1
- SUSE-SU-2020:1255-1
- SUSE-SU-2020:1275-1
- SUSE-SU-2020:1663-1
- USN-4319-1
- USN-4320-1
- USN-4324-1
- USN-4325-1
- USN-4342-1
- USN-4344-1
- USN-4419-1
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:deb/ubuntu/linux-image-virtual?distro=bionic | ubuntu | linux-image-virtual | < 4.15.0.96.87 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-virtual-hwe-16.04?distro=xenial | ubuntu | linux-image-virtual-hwe-16.04 | < 4.15.0.96.104 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-virtual-hwe-16.04?distro=bionic | ubuntu | linux-image-virtual-hwe-16.04 | < 4.15.0.96.87 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-virtual-hwe-16.04-edge?distro=xenial | ubuntu | linux-image-virtual-hwe-16.04-edge | < 4.15.0.96.104 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-virtual-hwe-16.04-edge?distro=bionic | ubuntu | linux-image-virtual-hwe-16.04-edge | < 4.15.0.96.87 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-oem?distro=xenial | ubuntu | linux-image-oem | < 4.15.0.96.104 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency?distro=bionic | ubuntu | linux-image-lowlatency | < 4.15.0.96.87 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency-hwe-16.04?distro=xenial | ubuntu | linux-image-lowlatency-hwe-16.04 | < 4.15.0.96.104 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency-hwe-16.04?distro=bionic | ubuntu | linux-image-lowlatency-hwe-16.04 | < 4.15.0.96.87 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency-hwe-16.04-edge?distro=xenial | ubuntu | linux-image-lowlatency-hwe-16.04-edge | < 4.15.0.96.104 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency-hwe-16.04-edge?distro=bionic | ubuntu | linux-image-lowlatency-hwe-16.04-edge | < 4.15.0.96.87 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-generic?distro=bionic | ubuntu | linux-image-generic | < 4.15.0.96.87 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae?distro=bionic | ubuntu | linux-image-generic-lpae | < 4.15.0.96.87 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae-hwe-16.04?distro=xenial | ubuntu | linux-image-generic-lpae-hwe-16.04 | < 4.15.0.96.104 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae-hwe-16.04?distro=bionic | ubuntu | linux-image-generic-lpae-hwe-16.04 | < 4.15.0.96.87 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae-hwe-16.04-edge?distro=xenial | ubuntu | linux-image-generic-lpae-hwe-16.04-edge | < 4.15.0.96.104 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae-hwe-16.04-edge?distro=bionic | ubuntu | linux-image-generic-lpae-hwe-16.04-edge | < 4.15.0.96.87 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-generic-hwe-16.04?distro=xenial | ubuntu | linux-image-generic-hwe-16.04 | < 4.15.0.96.104 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-generic-hwe-16.04?distro=bionic | ubuntu | linux-image-generic-hwe-16.04 | < 4.15.0.96.87 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-generic-hwe-16.04-edge?distro=xenial | ubuntu | linux-image-generic-hwe-16.04-edge | < 4.15.0.96.104 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-generic-hwe-16.04-edge?distro=bionic | ubuntu | linux-image-generic-hwe-16.04-edge | < 4.15.0.96.87 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-4.15.0-96-lowlatency?distro=xenial | ubuntu | linux-image-4.15.0-96-lowlatency | < 4.15.0-96.97~16.04.1 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.15.0-96-lowlatency?distro=bionic | ubuntu | linux-image-4.15.0-96-lowlatency | < 4.15.0-96.97 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-4.15.0-96-generic?distro=xenial | ubuntu | linux-image-4.15.0-96-generic | < 4.15.0-96.97~16.04.1 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.15.0-96-generic?distro=bionic | ubuntu | linux-image-4.15.0-96-generic | < 4.15.0-96.97 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-4.15.0-96-generic-lpae?distro=xenial | ubuntu | linux-image-4.15.0-96-generic-lpae | < 4.15.0-96.97~16.04.1 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.15.0-96-generic-lpae?distro=bionic | ubuntu | linux-image-4.15.0-96-generic-lpae | < 4.15.0-96.97 | bionic |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |