[USN-4427-1] Linux kernel vulnerabilities
Several security issues were fixed in the Linux kernel.
It was discovered that the Kvaser CAN/USB driver in the Linux kernel did
not properly initialize memory in certain situations. A local attacker
could possibly use this to expose sensitive information (kernel memory).
(CVE-2019-19947)
Chuhong Yuan discovered that go7007 USB audio device driver in the Linux
kernel did not properly deallocate memory in some failure conditions. A
physically proximate attacker could use this to cause a denial of service
(memory exhaustion). (CVE-2019-20810)
Jason A. Donenfeld discovered that the ACPI implementation in the Linux
kernel did not properly restrict loading SSDT code from an EFI variable. A
privileged attacker could use this to bypass Secure Boot lockdown
restrictions and execute arbitrary code in the kernel. (CVE-2019-20908)
It was discovered that the elf handling code in the Linux kernel did not
initialize memory before using it in certain situations. A local attacker
could use this to possibly expose sensitive information (kernel memory).
(CVE-2020-10732)
It was discovered that the Linux kernel did not correctly apply Speculative
Store Bypass Disable (SSBD) mitigations in certain situations. A local
attacker could possibly use this to expose sensitive information.
(CVE-2020-10766)
It was discovered that the Linux kernel did not correctly apply Indirect
Branch Predictor Barrier (IBPB) mitigations in certain situations. A local
attacker could possibly use this to expose sensitive information.
(CVE-2020-10767)
It was discovered that the Linux kernel could incorrectly enable Indirect
Branch Speculation after it has been disabled for a process via a prctl()
call. A local attacker could possibly use this to expose sensitive
information. (CVE-2020-10768)
Mauricio Faria de Oliveira discovered that the aufs implementation in the
Linux kernel improperly managed inode reference counts in the
vfsub_dentry_open() method. A local attacker could use this vulnerability
to cause a denial of service. (CVE-2020-11935)
It was discovered that the Virtual Terminal keyboard driver in the Linux
kernel contained an integer overflow. A local attacker could possibly use
this to have an unspecified impact. (CVE-2020-13974)
It was discovered that the efi subsystem in the Linux kernel did not handle
memory allocation failures during early boot in some situations. A local
attacker could possibly use this to cause a denial of service (system
crash). (CVE-2019-12380)
- ID
- USN-4427-1
- Severity
- medium
- URL
- https://ubuntu.com/security/notices/USN-4427-1
- Published
-
2020-07-27T23:09:34
(4 years ago) - Modified
-
2020-07-27T23:09:34
(4 years ago) - Other Advisories
-
- ALAS-2020-1401
- ALAS2-2020-1465
- ALSA-2020:4431
- ALSA-2022:1988
- ASB-A-156766097
- ASB-A-169505740
- ASB-A-169505929
- ASB-A-170658976
- DSA-4698-1
- DSA-4699-1
- ELSA-2020-3010
- ELSA-2020-3218
- ELSA-2020-4060
- ELSA-2020-5791
- ELSA-2020-5804
- ELSA-2020-5805
- ELSA-2020-5837
- ELSA-2020-5844
- ELSA-2020-5845
- ELSA-2020-5885
- ELSA-2020-5913
- ELSA-2022-1988
- FEDORA-2019-021c968423
- FEDORA-2019-057d691fd4
- FEDORA-2019-124a241044
- FEDORA-2019-15e141c6a7
- FEDORA-2019-1689d3fe07
- FEDORA-2019-41e28660ae
- FEDORA-2019-4c91a2f76e
- FEDORA-2019-6817686c4d
- FEDORA-2019-69c132b061
- FEDORA-2019-6bda4c81f4
- FEDORA-2019-6c3d89b3d0
- FEDORA-2019-7a3fc17778
- FEDORA-2019-7aecfe1c4b
- FEDORA-2019-7ec378191e
- FEDORA-2019-83858fc57b
- FEDORA-2019-8846a1a5a2
- FEDORA-2019-914542e05c
- FEDORA-2019-97380355ae
- FEDORA-2019-9d3fe6fd5b
- FEDORA-2019-a570a92d5a
- FEDORA-2019-a95015e60f
- FEDORA-2019-c03eda3cc6
- FEDORA-2019-e3010166bd
- FEDORA-2019-e37c348348
- FEDORA-2019-f40bd7826f
- FEDORA-2020-125ccdc871
- FEDORA-2020-1b2dae6219
- FEDORA-2020-2a5cdd665c
- FEDORA-2020-c2d89d14d0
- FEDORA-2020-fe00e12580
- MS:CVE-2019-20810
- MS:CVE-2020-10766
- MS:CVE-2020-10767
- MS:CVE-2020-10768
- MS:CVE-2020-13974
- openSUSE-SU-2019:1571-1
- openSUSE-SU-2019:1579-1
- openSUSE-SU-2020:0801-1
- openSUSE-SU-2020:0935-1
- openSUSE-SU-2020:1153-1
- openSUSE-SU-2021:0242-1
- RHSA-2020:3010
- RHSA-2020:3016
- RHSA-2020:3073
- RHSA-2020:3218
- RHSA-2020:3219
- RHSA-2020:4060
- RHSA-2020:4062
- RHSA-2020:4431
- RHSA-2020:4609
- RHSA-2022:1975
- RHSA-2022:1988
- RLSA-2022:1988
- SSA:2020-163-01
- SSA:2020-295-01
- SUSE-SU-2019:1823-1
- SUSE-SU-2019:1823-2
- SUSE-SU-2019:1829-1
- SUSE-SU-2019:1852-1
- SUSE-SU-2019:1855-1
- SUSE-SU-2019:2430-1
- SUSE-SU-2019:2450-1
- SUSE-SU-2020:1587-1
- SUSE-SU-2020:1599-1
- SUSE-SU-2020:1602-1
- SUSE-SU-2020:1603-1
- SUSE-SU-2020:1604-1
- SUSE-SU-2020:1605-1
- SUSE-SU-2020:1663-1
- SUSE-SU-2020:1693-1
- SUSE-SU-2020:1699-1
- SUSE-SU-2020:1713-1
- SUSE-SU-2020:2027-1
- SUSE-SU-2020:2103-1
- SUSE-SU-2020:2105-1
- SUSE-SU-2020:2106-1
- SUSE-SU-2020:2107-1
- SUSE-SU-2020:2119-1
- SUSE-SU-2020:2121-1
- SUSE-SU-2020:2122-1
- SUSE-SU-2020:2134-1
- SUSE-SU-2020:2152-1
- SUSE-SU-2020:2156-1
- SUSE-SU-2020:2478-1
- SUSE-SU-2020:2487-1
- USN-4284-1
- USN-4285-1
- USN-4411-1
- USN-4414-1
- USN-4425-1
- USN-4426-1
- USN-4439-1
- USN-4440-1
- USN-4483-1
- USN-4485-1
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:deb/ubuntu/linux-image-virtual?distro=xenial | ubuntu | linux-image-virtual | < 4.4.0.186.192 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-virtual-lts-xenial?distro=xenial | ubuntu | linux-image-virtual-lts-xenial | < 4.4.0.186.192 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-virtual-lts-xenial?distro=trusty | ubuntu | linux-image-virtual-lts-xenial | < 4.4.0.186.163 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-virtual-lts-wily?distro=xenial | ubuntu | linux-image-virtual-lts-wily | < 4.4.0.186.192 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-virtual-lts-vivid?distro=xenial | ubuntu | linux-image-virtual-lts-vivid | < 4.4.0.186.192 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-virtual-lts-utopic?distro=xenial | ubuntu | linux-image-virtual-lts-utopic | < 4.4.0.186.192 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-snapdragon?distro=xenial | ubuntu | linux-image-snapdragon | < 4.4.0.1140.132 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-raspi2?distro=xenial | ubuntu | linux-image-raspi2 | < 4.4.0.1136.136 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc64-smp?distro=xenial | ubuntu | linux-image-powerpc64-smp | < 4.4.0.186.192 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc64-smp-lts-xenial?distro=xenial | ubuntu | linux-image-powerpc64-smp-lts-xenial | < 4.4.0.186.192 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc64-smp-lts-xenial?distro=trusty | ubuntu | linux-image-powerpc64-smp-lts-xenial | < 4.4.0.186.163 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc64-smp-lts-wily?distro=xenial | ubuntu | linux-image-powerpc64-smp-lts-wily | < 4.4.0.186.192 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc64-smp-lts-vivid?distro=xenial | ubuntu | linux-image-powerpc64-smp-lts-vivid | < 4.4.0.186.192 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc64-smp-lts-utopic?distro=xenial | ubuntu | linux-image-powerpc64-smp-lts-utopic | < 4.4.0.186.192 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc64-emb?distro=xenial | ubuntu | linux-image-powerpc64-emb | < 4.4.0.186.192 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc64-emb-lts-xenial?distro=xenial | ubuntu | linux-image-powerpc64-emb-lts-xenial | < 4.4.0.186.192 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc64-emb-lts-xenial?distro=trusty | ubuntu | linux-image-powerpc64-emb-lts-xenial | < 4.4.0.186.163 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc64-emb-lts-wily?distro=xenial | ubuntu | linux-image-powerpc64-emb-lts-wily | < 4.4.0.186.192 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc64-emb-lts-vivid?distro=xenial | ubuntu | linux-image-powerpc64-emb-lts-vivid | < 4.4.0.186.192 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc64-emb-lts-utopic?distro=xenial | ubuntu | linux-image-powerpc64-emb-lts-utopic | < 4.4.0.186.192 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-smp?distro=xenial | ubuntu | linux-image-powerpc-smp | < 4.4.0.186.192 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-smp-lts-xenial?distro=xenial | ubuntu | linux-image-powerpc-smp-lts-xenial | < 4.4.0.186.192 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-smp-lts-xenial?distro=trusty | ubuntu | linux-image-powerpc-smp-lts-xenial | < 4.4.0.186.163 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-smp-lts-wily?distro=xenial | ubuntu | linux-image-powerpc-smp-lts-wily | < 4.4.0.186.192 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-smp-lts-vivid?distro=xenial | ubuntu | linux-image-powerpc-smp-lts-vivid | < 4.4.0.186.192 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-smp-lts-utopic?distro=xenial | ubuntu | linux-image-powerpc-smp-lts-utopic | < 4.4.0.186.192 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-e500mc?distro=xenial | ubuntu | linux-image-powerpc-e500mc | < 4.4.0.186.192 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-e500mc-lts-xenial?distro=xenial | ubuntu | linux-image-powerpc-e500mc-lts-xenial | < 4.4.0.186.192 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-e500mc-lts-xenial?distro=trusty | ubuntu | linux-image-powerpc-e500mc-lts-xenial | < 4.4.0.186.163 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-e500mc-lts-wily?distro=xenial | ubuntu | linux-image-powerpc-e500mc-lts-wily | < 4.4.0.186.192 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-e500mc-lts-vivid?distro=xenial | ubuntu | linux-image-powerpc-e500mc-lts-vivid | < 4.4.0.186.192 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-e500mc-lts-utopic?distro=xenial | ubuntu | linux-image-powerpc-e500mc-lts-utopic | < 4.4.0.186.192 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency?distro=xenial | ubuntu | linux-image-lowlatency | < 4.4.0.186.192 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency-lts-xenial?distro=xenial | ubuntu | linux-image-lowlatency-lts-xenial | < 4.4.0.186.192 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency-lts-xenial?distro=trusty | ubuntu | linux-image-lowlatency-lts-xenial | < 4.4.0.186.163 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency-lts-wily?distro=xenial | ubuntu | linux-image-lowlatency-lts-wily | < 4.4.0.186.192 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency-lts-vivid?distro=xenial | ubuntu | linux-image-lowlatency-lts-vivid | < 4.4.0.186.192 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency-lts-utopic?distro=xenial | ubuntu | linux-image-lowlatency-lts-utopic | < 4.4.0.186.192 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-kvm?distro=xenial | ubuntu | linux-image-kvm | < 4.4.0.1077.75 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-generic?distro=xenial | ubuntu | linux-image-generic | < 4.4.0.186.192 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lts-xenial?distro=xenial | ubuntu | linux-image-generic-lts-xenial | < 4.4.0.186.192 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lts-xenial?distro=trusty | ubuntu | linux-image-generic-lts-xenial | < 4.4.0.186.163 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lts-wily?distro=xenial | ubuntu | linux-image-generic-lts-wily | < 4.4.0.186.192 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lts-vivid?distro=xenial | ubuntu | linux-image-generic-lts-vivid | < 4.4.0.186.192 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lts-utopic?distro=xenial | ubuntu | linux-image-generic-lts-utopic | < 4.4.0.186.192 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae?distro=xenial | ubuntu | linux-image-generic-lpae | < 4.4.0.186.192 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae-lts-xenial?distro=xenial | ubuntu | linux-image-generic-lpae-lts-xenial | < 4.4.0.186.192 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae-lts-xenial?distro=trusty | ubuntu | linux-image-generic-lpae-lts-xenial | < 4.4.0.186.163 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae-lts-wily?distro=xenial | ubuntu | linux-image-generic-lpae-lts-wily | < 4.4.0.186.192 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae-lts-vivid?distro=xenial | ubuntu | linux-image-generic-lpae-lts-vivid | < 4.4.0.186.192 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae-lts-utopic?distro=xenial | ubuntu | linux-image-generic-lpae-lts-utopic | < 4.4.0.186.192 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-aws?distro=xenial | ubuntu | linux-image-aws | < 4.4.0.1111.116 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-aws?distro=trusty | ubuntu | linux-image-aws | < 4.4.0.1075.72 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-186-powerpc64-smp?distro=xenial | ubuntu | linux-image-4.4.0-186-powerpc64-smp | < 4.4.0-186.216 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-186-powerpc64-smp?distro=trusty | ubuntu | linux-image-4.4.0-186-powerpc64-smp | < 4.4.0-186.216~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-186-powerpc64-emb?distro=xenial | ubuntu | linux-image-4.4.0-186-powerpc64-emb | < 4.4.0-186.216 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-186-powerpc64-emb?distro=trusty | ubuntu | linux-image-4.4.0-186-powerpc64-emb | < 4.4.0-186.216~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-186-powerpc-smp?distro=xenial | ubuntu | linux-image-4.4.0-186-powerpc-smp | < 4.4.0-186.216 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-186-powerpc-smp?distro=trusty | ubuntu | linux-image-4.4.0-186-powerpc-smp | < 4.4.0-186.216~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-186-powerpc-e500mc?distro=xenial | ubuntu | linux-image-4.4.0-186-powerpc-e500mc | < 4.4.0-186.216 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-186-powerpc-e500mc?distro=trusty | ubuntu | linux-image-4.4.0-186-powerpc-e500mc | < 4.4.0-186.216~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-186-lowlatency?distro=xenial | ubuntu | linux-image-4.4.0-186-lowlatency | < 4.4.0-186.216 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-186-lowlatency?distro=trusty | ubuntu | linux-image-4.4.0-186-lowlatency | < 4.4.0-186.216~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-186-generic?distro=xenial | ubuntu | linux-image-4.4.0-186-generic | < 4.4.0-186.216 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-186-generic?distro=trusty | ubuntu | linux-image-4.4.0-186-generic | < 4.4.0-186.216~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-186-generic-lpae?distro=xenial | ubuntu | linux-image-4.4.0-186-generic-lpae | < 4.4.0-186.216 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-186-generic-lpae?distro=trusty | ubuntu | linux-image-4.4.0-186-generic-lpae | < 4.4.0-186.216~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-1140-snapdragon?distro=xenial | ubuntu | linux-image-4.4.0-1140-snapdragon | < 4.4.0-1140.148 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-1136-raspi2?distro=xenial | ubuntu | linux-image-4.4.0-1136-raspi2 | < 4.4.0-1136.145 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-1111-aws?distro=xenial | ubuntu | linux-image-4.4.0-1111-aws | < 4.4.0-1111.123 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-1077-kvm?distro=xenial | ubuntu | linux-image-4.4.0-1077-kvm | < 4.4.0-1077.84 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-1075-aws?distro=trusty | ubuntu | linux-image-4.4.0-1075-aws | < 4.4.0-1075.79 | trusty |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |