[USN-4367-1] Linux kernel vulnerabilities
Several security issues were fixed in the Linux kernel.
It was discovered that the btrfs implementation in the Linux kernel did not
properly detect that a block was marked dirty in some situations. An
attacker could use this to specially craft a file system image that, when
unmounted, could cause a denial of service (system crash). (CVE-2019-19377)
It was discovered that the linux kernel did not properly validate certain
mount options to the tmpfs virtual memory file system. A local attacker
with the ability to specify mount options could use this to cause a denial
of service (system crash). (CVE-2020-11565)
It was discovered that the block layer in the Linux kernel contained a race
condition leading to a use-after-free vulnerability. A local attacker could
possibly use this to cause a denial of service (system crash) or execute
arbitrary code. (CVE-2020-12657)
- ID
- USN-4367-1
- Severity
- medium
- URL
- https://ubuntu.com/security/notices/USN-4367-1
- Published
-
2020-05-24T02:16:45
(4 years ago) - Modified
-
2020-05-24T02:16:45
(4 years ago) - Other Advisories
-
- ALAS-2020-1366
- ALAS-2020-1382
- ALAS2-2020-1440
- ALSA-2020:4431
- DSA-4667-1
- DSA-4698-1
- ELSA-2020-2427
- ELSA-2020-4060
- ELSA-2020-5714
- ELSA-2020-5755
- ELSA-2020-5913
- ELSA-2022-10065
- MS:CVE-2020-11565
- MS:CVE-2020-12657
- MS:CVE-2020-12826
- openSUSE-SU-2020:0801-1
- openSUSE-SU-2022:2177-1
- RHSA-2020:2427
- RHSA-2020:2428
- RHSA-2020:2567
- RHSA-2020:4060
- RHSA-2020:4062
- RHSA-2020:4431
- RHSA-2020:4609
- SSA:2020-163-01
- SUSE-SU-2020:1587-1
- SUSE-SU-2020:1599-1
- SUSE-SU-2020:1602-1
- SUSE-SU-2020:1603-1
- SUSE-SU-2020:1604-1
- SUSE-SU-2020:1605-1
- SUSE-SU-2020:1663-1
- SUSE-SU-2020:2156-1
- SUSE-SU-2020:2478-1
- SUSE-SU-2020:2487-1
- SUSE-SU-2022:2077-1
- SUSE-SU-2022:2078-1
- SUSE-SU-2022:2079-1
- SUSE-SU-2022:2080-1
- SUSE-SU-2022:2082-1
- SUSE-SU-2022:2103-1
- SUSE-SU-2022:2104-1
- SUSE-SU-2022:2111-1
- SUSE-SU-2022:2116-1
- SUSE-SU-2022:2177-1
- SUSE-SU-2022:2393-1
- SUSE-SU-2022:2629-1
- USN-4363-1
- USN-4364-1
- USN-4368-1
- USN-4369-1
- USN-4391-1
- USN-4414-1
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:deb/ubuntu/linux-image-virtual?distro=focal | ubuntu | linux-image-virtual | < 5.4.0.31.36 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-virtual-hwe-20.04?distro=focal | ubuntu | linux-image-virtual-hwe-20.04 | < 5.4.0.31.36 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-virtual-hwe-18.04?distro=focal | ubuntu | linux-image-virtual-hwe-18.04 | < 5.4.0.31.36 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-virtual-hwe-18.04-edge?distro=focal | ubuntu | linux-image-virtual-hwe-18.04-edge | < 5.4.0.31.36 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-raspi?distro=focal | ubuntu | linux-image-raspi | < 5.4.0.1011.11 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-raspi2?distro=focal | ubuntu | linux-image-raspi2 | < 5.4.0.1011.11 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-oracle?distro=focal | ubuntu | linux-image-oracle | < 5.4.0.1011.12 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-oem?distro=focal | ubuntu | linux-image-oem | < 5.4.0.31.36 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-oem-osp1?distro=focal | ubuntu | linux-image-oem-osp1 | < 5.4.0.31.36 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency?distro=focal | ubuntu | linux-image-lowlatency | < 5.4.0.31.36 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency-hwe-20.04?distro=focal | ubuntu | linux-image-lowlatency-hwe-20.04 | < 5.4.0.31.36 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency-hwe-18.04?distro=focal | ubuntu | linux-image-lowlatency-hwe-18.04 | < 5.4.0.31.36 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency-hwe-18.04-edge?distro=focal | ubuntu | linux-image-lowlatency-hwe-18.04-edge | < 5.4.0.31.36 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-kvm?distro=focal | ubuntu | linux-image-kvm | < 5.4.0.1011.12 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-gke?distro=focal | ubuntu | linux-image-gke | < 5.4.0.1011.12 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-generic?distro=focal | ubuntu | linux-image-generic | < 5.4.0.31.36 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae?distro=focal | ubuntu | linux-image-generic-lpae | < 5.4.0.31.36 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae-hwe-20.04?distro=focal | ubuntu | linux-image-generic-lpae-hwe-20.04 | < 5.4.0.31.36 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae-hwe-18.04?distro=focal | ubuntu | linux-image-generic-lpae-hwe-18.04 | < 5.4.0.31.36 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae-hwe-18.04-edge?distro=focal | ubuntu | linux-image-generic-lpae-hwe-18.04-edge | < 5.4.0.31.36 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-generic-hwe-20.04?distro=focal | ubuntu | linux-image-generic-hwe-20.04 | < 5.4.0.31.36 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-generic-hwe-18.04?distro=focal | ubuntu | linux-image-generic-hwe-18.04 | < 5.4.0.31.36 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-generic-hwe-18.04-edge?distro=focal | ubuntu | linux-image-generic-hwe-18.04-edge | < 5.4.0.31.36 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-gcp?distro=focal | ubuntu | linux-image-gcp | < 5.4.0.1011.12 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-azure?distro=focal | ubuntu | linux-image-azure | < 5.4.0.1012.14 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-aws?distro=focal | ubuntu | linux-image-aws | < 5.4.0.1011.14 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-5.4.0-31-lowlatency?distro=focal | ubuntu | linux-image-5.4.0-31-lowlatency | < 5.4.0-31.35 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-5.4.0-31-generic?distro=focal | ubuntu | linux-image-5.4.0-31-generic | < 5.4.0-31.35 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-5.4.0-31-generic-lpae?distro=focal | ubuntu | linux-image-5.4.0-31-generic-lpae | < 5.4.0-31.35 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-5.4.0-26-generic?distro=focal | ubuntu | linux-image-5.4.0-26-generic | < 5.4.0-26.30 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-5.4.0-1012-azure?distro=focal | ubuntu | linux-image-5.4.0-1012-azure | < 5.4.0-1012.12 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-5.4.0-1011-raspi?distro=focal | ubuntu | linux-image-5.4.0-1011-raspi | < 5.4.0-1011.11 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-5.4.0-1011-oracle?distro=focal | ubuntu | linux-image-5.4.0-1011-oracle | < 5.4.0-1011.11 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-5.4.0-1011-kvm?distro=focal | ubuntu | linux-image-5.4.0-1011-kvm | < 5.4.0-1011.11 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-5.4.0-1011-gcp?distro=focal | ubuntu | linux-image-5.4.0-1011-gcp | < 5.4.0-1011.11 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-5.4.0-1011-aws?distro=focal | ubuntu | linux-image-5.4.0-1011-aws | < 5.4.0-1011.11 | focal |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |