[USN-4419-1] Linux kernel vulnerabilities
Several security issues were fixed in the Linux kernel.
It was discovered that a race condition existed in the Precision Time
Protocol (PTP) implementation in the Linux kernel, leading to a use-after-
free vulnerability. A local attacker could possibly use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2020-10690)
Matthew Sheets discovered that the SELinux network label handling
implementation in the Linux kernel could be coerced into de-referencing a
NULL pointer. A remote attacker could use this to cause a denial of service
(system crash). (CVE-2020-10711)
It was discovered that the SCSI generic (sg) driver in the Linux kernel did
not properly handle certain error conditions correctly. A local privileged
attacker could use this to cause a denial of service (system crash).
(CVE-2020-12770)
It was discovered that the USB Gadget device driver in the Linux kernel did
not validate arguments passed from configfs in some situations. A local
attacker could possibly use this to cause a denial of service (system
crash) or possibly expose sensitive information. (CVE-2020-13143)
Shijie Luo discovered that the ext4 file system implementation in the Linux
kernel did not properly check for a too-large journal size. An attacker
could use this to construct a malicious ext4 image that, when mounted,
could cause a denial of service (soft lockup). (CVE-2020-8992)
- ID
- USN-4419-1
- Severity
- medium
- URL
- https://ubuntu.com/security/notices/USN-4419-1
- Published
-
2020-07-06T22:07:15
(4 years ago) - Modified
-
2020-07-06T22:07:15
(4 years ago) - Other Advisories
-
- ALAS-2020-1366
- ALAS-2020-1377
- ALAS-2020-1382
- ALAS2-2020-1425
- ALAS2-2020-1431
- ALSA-2020:4431
- DSA-4698-1
- DSA-4699-1
- ELSA-2020-2082
- ELSA-2020-2102
- ELSA-2020-2103
- ELSA-2020-4060
- ELSA-2020-5663
- ELSA-2020-5755
- ELSA-2020-5756
- ELSA-2021-9002
- ELSA-2022-9852
- ELSA-2022-9969
- FEDORA-2020-203ffedeb5
- FEDORA-2020-4336d63533
- FEDORA-2020-4c69987c40
- FEDORA-2020-5a69decc0c
- FEDORA-2020-c6b9fff7f8
- FEDORA-2020-e47d28bc2b
- MS:CVE-2020-10690
- MS:CVE-2020-10711
- MS:CVE-2020-12770
- MS:CVE-2020-13143
- MS:CVE-2020-8992
- openSUSE-SU-2020:0336-1
- openSUSE-SU-2020:0801-1
- openSUSE-SU-2020:0935-1
- openSUSE-SU-2021:0242-1
- openSUSE-SU-2021:3179-1
- openSUSE-SU-2021:3205-1
- openSUSE-SU-2021:3876-1
- RHSA-2020:1567
- RHSA-2020:1769
- RHSA-2020:2082
- RHSA-2020:2085
- RHSA-2020:2102
- RHSA-2020:2103
- RHSA-2020:2125
- RHSA-2020:2171
- RHSA-2020:4060
- RHSA-2020:4062
- RHSA-2020:4431
- RHSA-2020:4609
- SSA:2020-163-01
- SUSE-SU-2020:0511-1
- SUSE-SU-2020:0558-1
- SUSE-SU-2020:0559-1
- SUSE-SU-2020:0560-1
- SUSE-SU-2020:0580-1
- SUSE-SU-2020:0584-1
- SUSE-SU-2020:0649-1
- SUSE-SU-2020:0667-1
- SUSE-SU-2020:0688-1
- SUSE-SU-2020:1255-1
- SUSE-SU-2020:1275-1
- SUSE-SU-2020:1587-1
- SUSE-SU-2020:1599-1
- SUSE-SU-2020:1602-1
- SUSE-SU-2020:1603-1
- SUSE-SU-2020:1604-1
- SUSE-SU-2020:1605-1
- SUSE-SU-2020:1663-1
- SUSE-SU-2020:2027-1
- SUSE-SU-2020:2105-1
- SUSE-SU-2020:2134-1
- SUSE-SU-2020:2152-1
- SUSE-SU-2020:2156-1
- SUSE-SU-2020:2478-1
- SUSE-SU-2020:2487-1
- SUSE-SU-2021:3179-1
- SUSE-SU-2021:3205-1
- SUSE-SU-2021:3205-2
- SUSE-SU-2021:3206-1
- SUSE-SU-2021:3217-1
- SUSE-SU-2021:3415-1
- SUSE-SU-2021:3876-1
- SUSE-SU-2021:3969-1
- SUSE-SU-2021:3972-1
- USN-4318-1
- USN-4324-1
- USN-4342-1
- USN-4344-1
- USN-4411-1
- USN-4412-1
- USN-4413-1
- USN-4414-1
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:deb/ubuntu/linux-image-virtual?distro=xenial | ubuntu | linux-image-virtual | < 4.4.0.185.191 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-virtual-lts-xenial?distro=xenial | ubuntu | linux-image-virtual-lts-xenial | < 4.4.0.185.191 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-virtual-lts-xenial?distro=trusty | ubuntu | linux-image-virtual-lts-xenial | < 4.4.0.185.162 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-virtual-lts-wily?distro=xenial | ubuntu | linux-image-virtual-lts-wily | < 4.4.0.185.191 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-virtual-lts-vivid?distro=xenial | ubuntu | linux-image-virtual-lts-vivid | < 4.4.0.185.191 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-virtual-lts-utopic?distro=xenial | ubuntu | linux-image-virtual-lts-utopic | < 4.4.0.185.191 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-snapdragon?distro=xenial | ubuntu | linux-image-snapdragon | < 4.4.0.1139.131 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-raspi2?distro=xenial | ubuntu | linux-image-raspi2 | < 4.4.0.1135.135 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc64-smp?distro=xenial | ubuntu | linux-image-powerpc64-smp | < 4.4.0.185.191 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc64-smp-lts-xenial?distro=xenial | ubuntu | linux-image-powerpc64-smp-lts-xenial | < 4.4.0.185.191 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc64-smp-lts-xenial?distro=trusty | ubuntu | linux-image-powerpc64-smp-lts-xenial | < 4.4.0.185.162 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc64-smp-lts-wily?distro=xenial | ubuntu | linux-image-powerpc64-smp-lts-wily | < 4.4.0.185.191 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc64-smp-lts-vivid?distro=xenial | ubuntu | linux-image-powerpc64-smp-lts-vivid | < 4.4.0.185.191 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc64-smp-lts-utopic?distro=xenial | ubuntu | linux-image-powerpc64-smp-lts-utopic | < 4.4.0.185.191 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc64-emb?distro=xenial | ubuntu | linux-image-powerpc64-emb | < 4.4.0.185.191 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc64-emb-lts-xenial?distro=xenial | ubuntu | linux-image-powerpc64-emb-lts-xenial | < 4.4.0.185.191 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc64-emb-lts-xenial?distro=trusty | ubuntu | linux-image-powerpc64-emb-lts-xenial | < 4.4.0.185.162 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc64-emb-lts-wily?distro=xenial | ubuntu | linux-image-powerpc64-emb-lts-wily | < 4.4.0.185.191 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc64-emb-lts-vivid?distro=xenial | ubuntu | linux-image-powerpc64-emb-lts-vivid | < 4.4.0.185.191 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc64-emb-lts-utopic?distro=xenial | ubuntu | linux-image-powerpc64-emb-lts-utopic | < 4.4.0.185.191 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-smp?distro=xenial | ubuntu | linux-image-powerpc-smp | < 4.4.0.185.191 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-smp-lts-xenial?distro=xenial | ubuntu | linux-image-powerpc-smp-lts-xenial | < 4.4.0.185.191 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-smp-lts-xenial?distro=trusty | ubuntu | linux-image-powerpc-smp-lts-xenial | < 4.4.0.185.162 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-smp-lts-wily?distro=xenial | ubuntu | linux-image-powerpc-smp-lts-wily | < 4.4.0.185.191 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-smp-lts-vivid?distro=xenial | ubuntu | linux-image-powerpc-smp-lts-vivid | < 4.4.0.185.191 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-smp-lts-utopic?distro=xenial | ubuntu | linux-image-powerpc-smp-lts-utopic | < 4.4.0.185.191 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-e500mc?distro=xenial | ubuntu | linux-image-powerpc-e500mc | < 4.4.0.185.191 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-e500mc-lts-xenial?distro=xenial | ubuntu | linux-image-powerpc-e500mc-lts-xenial | < 4.4.0.185.191 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-e500mc-lts-xenial?distro=trusty | ubuntu | linux-image-powerpc-e500mc-lts-xenial | < 4.4.0.185.162 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-e500mc-lts-wily?distro=xenial | ubuntu | linux-image-powerpc-e500mc-lts-wily | < 4.4.0.185.191 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-e500mc-lts-vivid?distro=xenial | ubuntu | linux-image-powerpc-e500mc-lts-vivid | < 4.4.0.185.191 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-e500mc-lts-utopic?distro=xenial | ubuntu | linux-image-powerpc-e500mc-lts-utopic | < 4.4.0.185.191 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency?distro=xenial | ubuntu | linux-image-lowlatency | < 4.4.0.185.191 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency-lts-xenial?distro=xenial | ubuntu | linux-image-lowlatency-lts-xenial | < 4.4.0.185.191 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency-lts-xenial?distro=trusty | ubuntu | linux-image-lowlatency-lts-xenial | < 4.4.0.185.162 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency-lts-wily?distro=xenial | ubuntu | linux-image-lowlatency-lts-wily | < 4.4.0.185.191 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency-lts-vivid?distro=xenial | ubuntu | linux-image-lowlatency-lts-vivid | < 4.4.0.185.191 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency-lts-utopic?distro=xenial | ubuntu | linux-image-lowlatency-lts-utopic | < 4.4.0.185.191 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-kvm?distro=xenial | ubuntu | linux-image-kvm | < 4.4.0.1076.74 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-generic?distro=xenial | ubuntu | linux-image-generic | < 4.4.0.185.191 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lts-xenial?distro=xenial | ubuntu | linux-image-generic-lts-xenial | < 4.4.0.185.191 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lts-xenial?distro=trusty | ubuntu | linux-image-generic-lts-xenial | < 4.4.0.185.162 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lts-wily?distro=xenial | ubuntu | linux-image-generic-lts-wily | < 4.4.0.185.191 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lts-vivid?distro=xenial | ubuntu | linux-image-generic-lts-vivid | < 4.4.0.185.191 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lts-utopic?distro=xenial | ubuntu | linux-image-generic-lts-utopic | < 4.4.0.185.191 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae?distro=xenial | ubuntu | linux-image-generic-lpae | < 4.4.0.185.191 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae-lts-xenial?distro=xenial | ubuntu | linux-image-generic-lpae-lts-xenial | < 4.4.0.185.191 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae-lts-xenial?distro=trusty | ubuntu | linux-image-generic-lpae-lts-xenial | < 4.4.0.185.162 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae-lts-wily?distro=xenial | ubuntu | linux-image-generic-lpae-lts-wily | < 4.4.0.185.191 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae-lts-vivid?distro=xenial | ubuntu | linux-image-generic-lpae-lts-vivid | < 4.4.0.185.191 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae-lts-utopic?distro=xenial | ubuntu | linux-image-generic-lpae-lts-utopic | < 4.4.0.185.191 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-aws?distro=xenial | ubuntu | linux-image-aws | < 4.4.0.1110.114 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-aws?distro=trusty | ubuntu | linux-image-aws | < 4.4.0.1074.71 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-185-powerpc64-smp?distro=xenial | ubuntu | linux-image-4.4.0-185-powerpc64-smp | < 4.4.0-185.215 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-185-powerpc64-smp?distro=trusty | ubuntu | linux-image-4.4.0-185-powerpc64-smp | < 4.4.0-185.215~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-185-powerpc64-emb?distro=xenial | ubuntu | linux-image-4.4.0-185-powerpc64-emb | < 4.4.0-185.215 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-185-powerpc64-emb?distro=trusty | ubuntu | linux-image-4.4.0-185-powerpc64-emb | < 4.4.0-185.215~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-185-powerpc-smp?distro=xenial | ubuntu | linux-image-4.4.0-185-powerpc-smp | < 4.4.0-185.215 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-185-powerpc-smp?distro=trusty | ubuntu | linux-image-4.4.0-185-powerpc-smp | < 4.4.0-185.215~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-185-powerpc-e500mc?distro=xenial | ubuntu | linux-image-4.4.0-185-powerpc-e500mc | < 4.4.0-185.215 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-185-powerpc-e500mc?distro=trusty | ubuntu | linux-image-4.4.0-185-powerpc-e500mc | < 4.4.0-185.215~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-185-lowlatency?distro=xenial | ubuntu | linux-image-4.4.0-185-lowlatency | < 4.4.0-185.215 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-185-lowlatency?distro=trusty | ubuntu | linux-image-4.4.0-185-lowlatency | < 4.4.0-185.215~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-185-generic?distro=xenial | ubuntu | linux-image-4.4.0-185-generic | < 4.4.0-185.215 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-185-generic?distro=trusty | ubuntu | linux-image-4.4.0-185-generic | < 4.4.0-185.215~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-185-generic-lpae?distro=xenial | ubuntu | linux-image-4.4.0-185-generic-lpae | < 4.4.0-185.215 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-185-generic-lpae?distro=trusty | ubuntu | linux-image-4.4.0-185-generic-lpae | < 4.4.0-185.215~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-1139-snapdragon?distro=xenial | ubuntu | linux-image-4.4.0-1139-snapdragon | < 4.4.0-1139.147 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-1135-raspi2?distro=xenial | ubuntu | linux-image-4.4.0-1135-raspi2 | < 4.4.0-1135.144 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-1110-aws?distro=xenial | ubuntu | linux-image-4.4.0-1110-aws | < 4.4.0-1110.121 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-1076-kvm?distro=xenial | ubuntu | linux-image-4.4.0-1076-kvm | < 4.4.0-1076.83 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-1074-aws?distro=trusty | ubuntu | linux-image-4.4.0-1074-aws | < 4.4.0-1074.78 | trusty |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |