[USN-4659-1] Linux kernel vulnerabilities
Several security issues were fixed in the Linux kernel.
It was discovered that a race condition existed in the binder IPC
implementation in the Linux kernel, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2020-0423)
Daniele Antonioli, Nils Ole Tippenhauer, and Kasper Rasmussen discovered
that legacy pairing and secure-connections pairing authentication in the
Bluetooth protocol could allow an unauthenticated user to complete
authentication without pairing credentials via adjacent access. A
physically proximate attacker could use this to impersonate a previously
paired Bluetooth device. (CVE-2020-10135)
It was discovered that a race condition existed in the perf subsystem of
the Linux kernel, leading to a use-after-free vulnerability. An attacker
with access to the perf subsystem could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2020-14351)
Keyu Man discovered that the ICMP global rate limiter in the Linux kernel
could be used to assist in scanning open UDP ports. A remote attacker could
use to facilitate attacks on UDP based services that depend on source port
randomization. (CVE-2020-25705)
It was discovered that the KVM hypervisor in the Linux kernel did not
properly handle interrupts in certain situations. A local attacker in a
guest VM could possibly use this to cause a denial of service (host system
crash). (CVE-2020-27152)
It was discovered that the framebuffer implementation in the Linux kernel
did not properly perform range checks in certain situations. A local
attacker could use this to expose sensitive information (kernel memory).
(CVE-2020-28915)
It was discovered that Power 9 processors could be coerced to expose
information from the L1 cache in certain situations. A local attacker could
use this to expose sensitive information. (CVE-2020-4788)
- ID
- USN-4659-1
- Severity
- high
- Severity from
- CVE-2020-0423
- URL
- https://ubuntu.com/security/notices/USN-4659-1
- Published
-
2020-12-02T02:18:58
(3 years ago) - Modified
-
2020-12-02T02:18:58
(3 years ago) - Other Advisories
-
- ALAS-2020-1446
- ALAS-2021-1461
- ALAS2-2020-1556
- ALAS2-2020-1566
- ALSA-2021:0558
- ALSA-2021:1093
- ALSA-2022:1988
- ALSA-2022:5316
- ASB-A-161151868
- ASB-A-174737972
- ELSA-2020-5996
- ELSA-2021-0558
- ELSA-2021-0856
- ELSA-2021-1093
- ELSA-2021-9001
- ELSA-2021-9002
- ELSA-2021-9006
- ELSA-2021-9007
- ELSA-2021-9043
- ELSA-2021-9305
- ELSA-2021-9308
- ELSA-2022-1988
- ELSA-2022-5316
- FEDORA-2020-4700a73bd5
- FEDORA-2020-8c15928d23
- MS:CVE-2020-14351
- MS:CVE-2020-25705
- MS:CVE-2020-27152
- MS:CVE-2020-28915
- openSUSE-SU-2020:1153-1
- openSUSE-SU-2020:1236-1
- openSUSE-SU-2020:1906-1
- openSUSE-SU-2020:2034-1
- openSUSE-SU-2020:2112-1
- openSUSE-SU-2020:2161-1
- openSUSE-SU-2020:2193-1
- openSUSE-SU-2020:2260-1
- openSUSE-SU-2021:0075-1
- openSUSE-SU-2021:0242-1
- openSUSE-SU-2021:3876-1
- RHSA-2021:0537
- RHSA-2021:0558
- RHSA-2021:0856
- RHSA-2021:0857
- RHSA-2021:1081
- RHSA-2021:1093
- RHSA-2022:1988
- RHSA-2022:5316
- RHSA-2022:5344
- RLSA-2022:1988
- RLSA-2022:5316
- SUSE-SU-2020:2102-1
- SUSE-SU-2020:2105-1
- SUSE-SU-2020:2119-1
- SUSE-SU-2020:2122-1
- SUSE-SU-2020:2134-1
- SUSE-SU-2020:2152-1
- SUSE-SU-2020:2487-1
- SUSE-SU-2020:2541-1
- SUSE-SU-2020:2575-1
- SUSE-SU-2020:2605-1
- SUSE-SU-2020:2610-1
- SUSE-SU-2020:2623-1
- SUSE-SU-2020:3122-1
- SUSE-SU-2020:3272-1
- SUSE-SU-2020:3273-1
- SUSE-SU-2020:3281-1
- SUSE-SU-2020:3326-1
- SUSE-SU-2020:3484-1
- SUSE-SU-2020:3491-1
- SUSE-SU-2020:3501-1
- SUSE-SU-2020:3503-1
- SUSE-SU-2020:3507-1
- SUSE-SU-2020:3512-1
- SUSE-SU-2020:3513-1
- SUSE-SU-2020:3522-1
- SUSE-SU-2020:3532-1
- SUSE-SU-2020:3544-1
- SUSE-SU-2020:3651-1
- SUSE-SU-2020:3670-1
- SUSE-SU-2020:3690-1
- SUSE-SU-2020:3713-1
- SUSE-SU-2020:3714-1
- SUSE-SU-2020:3715-1
- SUSE-SU-2020:3717-1
- SUSE-SU-2020:3718-1
- SUSE-SU-2020:3748-1
- SUSE-SU-2020:3764-1
- SUSE-SU-2020:3766-1
- SUSE-SU-2020:3798-1
- SUSE-SU-2021:0097-1
- SUSE-SU-2021:0098-1
- SUSE-SU-2021:0118-1
- SUSE-SU-2021:0133-1
- SUSE-SU-2021:0434-1
- SUSE-SU-2021:0437-1
- SUSE-SU-2021:0438-1
- SUSE-SU-2021:0452-1
- SUSE-SU-2021:3876-1
- SUSE-SU-2021:3935-1
- SUSE-SU-2024:2360-1
- SUSE-SU-2024:2365-1
- SUSE-SU-2024:2561-1
- USN-4657-1
- USN-4658-1
- USN-4660-1
- USN-4680-1
- USN-4681-1
- USN-4752-1
- USN-4912-1
- VU:647177
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:deb/ubuntu/linux-image-virtual?distro=groovy | ubuntu | linux-image-virtual | < 5.8.0.31.36 | groovy | ||
Affected | pkg:deb/ubuntu/linux-image-virtual-hwe-20.04?distro=groovy | ubuntu | linux-image-virtual-hwe-20.04 | < 5.8.0.31.36 | groovy | ||
Affected | pkg:deb/ubuntu/linux-image-virtual-hwe-20.04-edge?distro=groovy | ubuntu | linux-image-virtual-hwe-20.04-edge | < 5.8.0.31.36 | groovy | ||
Affected | pkg:deb/ubuntu/linux-image-raspi?distro=groovy | ubuntu | linux-image-raspi | < 5.8.0.1008.11 | groovy | ||
Affected | pkg:deb/ubuntu/linux-image-raspi-nolpae?distro=groovy | ubuntu | linux-image-raspi-nolpae | < 5.8.0.1008.11 | groovy | ||
Affected | pkg:deb/ubuntu/linux-image-oracle?distro=groovy | ubuntu | linux-image-oracle | < 5.8.0.1011.11 | groovy | ||
Affected | pkg:deb/ubuntu/linux-image-oem-20.04?distro=groovy | ubuntu | linux-image-oem-20.04 | < 5.8.0.31.36 | groovy | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency?distro=groovy | ubuntu | linux-image-lowlatency | < 5.8.0.31.36 | groovy | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency-hwe-20.04?distro=groovy | ubuntu | linux-image-lowlatency-hwe-20.04 | < 5.8.0.31.36 | groovy | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency-hwe-20.04-edge?distro=groovy | ubuntu | linux-image-lowlatency-hwe-20.04-edge | < 5.8.0.31.36 | groovy | ||
Affected | pkg:deb/ubuntu/linux-image-kvm?distro=groovy | ubuntu | linux-image-kvm | < 5.8.0.1011.12 | groovy | ||
Affected | pkg:deb/ubuntu/linux-image-gke?distro=groovy | ubuntu | linux-image-gke | < 5.8.0.1012.12 | groovy | ||
Affected | pkg:deb/ubuntu/linux-image-generic?distro=groovy | ubuntu | linux-image-generic | < 5.8.0.31.36 | groovy | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae?distro=groovy | ubuntu | linux-image-generic-lpae | < 5.8.0.31.36 | groovy | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae-hwe-20.04?distro=groovy | ubuntu | linux-image-generic-lpae-hwe-20.04 | < 5.8.0.31.36 | groovy | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae-hwe-20.04-edge?distro=groovy | ubuntu | linux-image-generic-lpae-hwe-20.04-edge | < 5.8.0.31.36 | groovy | ||
Affected | pkg:deb/ubuntu/linux-image-generic-hwe-20.04?distro=groovy | ubuntu | linux-image-generic-hwe-20.04 | < 5.8.0.31.36 | groovy | ||
Affected | pkg:deb/ubuntu/linux-image-generic-hwe-20.04-edge?distro=groovy | ubuntu | linux-image-generic-hwe-20.04-edge | < 5.8.0.31.36 | groovy | ||
Affected | pkg:deb/ubuntu/linux-image-generic-64k?distro=groovy | ubuntu | linux-image-generic-64k | < 5.8.0.31.36 | groovy | ||
Affected | pkg:deb/ubuntu/linux-image-generic-64k-hwe-20.04?distro=groovy | ubuntu | linux-image-generic-64k-hwe-20.04 | < 5.8.0.31.36 | groovy | ||
Affected | pkg:deb/ubuntu/linux-image-generic-64k-hwe-20.04-edge?distro=groovy | ubuntu | linux-image-generic-64k-hwe-20.04-edge | < 5.8.0.31.36 | groovy | ||
Affected | pkg:deb/ubuntu/linux-image-gcp?distro=groovy | ubuntu | linux-image-gcp | < 5.8.0.1012.12 | groovy | ||
Affected | pkg:deb/ubuntu/linux-image-azure?distro=groovy | ubuntu | linux-image-azure | < 5.8.0.1013.13 | groovy | ||
Affected | pkg:deb/ubuntu/linux-image-aws?distro=groovy | ubuntu | linux-image-aws | < 5.8.0.1014.16 | groovy | ||
Affected | pkg:deb/ubuntu/linux-image-5.8.0-31-lowlatency?distro=groovy | ubuntu | linux-image-5.8.0-31-lowlatency | < 5.8.0-31.33 | groovy | ||
Affected | pkg:deb/ubuntu/linux-image-5.8.0-31-generic?distro=groovy | ubuntu | linux-image-5.8.0-31-generic | < 5.8.0-31.33 | groovy | ||
Affected | pkg:deb/ubuntu/linux-image-5.8.0-31-generic-lpae?distro=groovy | ubuntu | linux-image-5.8.0-31-generic-lpae | < 5.8.0-31.33 | groovy | ||
Affected | pkg:deb/ubuntu/linux-image-5.8.0-31-generic-64k?distro=groovy | ubuntu | linux-image-5.8.0-31-generic-64k | < 5.8.0-31.33 | groovy | ||
Affected | pkg:deb/ubuntu/linux-image-5.8.0-1014-aws?distro=groovy | ubuntu | linux-image-5.8.0-1014-aws | < 5.8.0-1014.15 | groovy | ||
Affected | pkg:deb/ubuntu/linux-image-5.8.0-1013-azure?distro=groovy | ubuntu | linux-image-5.8.0-1013-azure | < 5.8.0-1013.14 | groovy | ||
Affected | pkg:deb/ubuntu/linux-image-5.8.0-1012-gcp?distro=groovy | ubuntu | linux-image-5.8.0-1012-gcp | < 5.8.0-1012.12 | groovy | ||
Affected | pkg:deb/ubuntu/linux-image-5.8.0-1011-oracle?distro=groovy | ubuntu | linux-image-5.8.0-1011-oracle | < 5.8.0-1011.11 | groovy | ||
Affected | pkg:deb/ubuntu/linux-image-5.8.0-1011-kvm?distro=groovy | ubuntu | linux-image-5.8.0-1011-kvm | < 5.8.0-1011.12 | groovy | ||
Affected | pkg:deb/ubuntu/linux-image-5.8.0-1008-raspi?distro=groovy | ubuntu | linux-image-5.8.0-1008-raspi | < 5.8.0-1008.11 | groovy | ||
Affected | pkg:deb/ubuntu/linux-image-5.8.0-1008-raspi-nolpae?distro=groovy | ubuntu | linux-image-5.8.0-1008-raspi-nolpae | < 5.8.0-1008.11 | groovy |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |