[USN-4680-1] Linux kernel vulnerabilities

Severity Medium
Affected Packages 56
CVEs 9

Several security issues were fixed in the Linux kernel.

It was discovered that debugfs in the Linux kernel as used by blktrace
contained a use-after-free in some situations. A privileged local attacker
could possibly use this to cause a denial of service (system crash).
(CVE-2019-19770)

It was discovered that a race condition existed in the binder IPC
implementation in the Linux kernel, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2020-0423)

Daniele Antonioli, Nils Ole Tippenhauer, and Kasper Rasmussen discovered
that legacy pairing and secure-connections pairing authentication in the
Bluetooth protocol could allow an unauthenticated user to complete
authentication without pairing credentials via adjacent access. A
physically proximate attacker could use this to impersonate a previously
paired Bluetooth device. (CVE-2020-10135)

It was discovered that the console keyboard driver in the Linux kernel
contained a race condition. A local attacker could use this to expose
sensitive information (kernel memory). (CVE-2020-25656)

Minh Yuan discovered that the tty driver in the Linux kernel contained race
conditions when handling fonts. A local attacker could possibly use this to
expose sensitive information (kernel memory). (CVE-2020-25668)

Keyu Man discovered that the ICMP global rate limiter in the Linux kernel
could be used to assist in scanning open UDP ports. A remote attacker could
use to facilitate attacks on UDP based services that depend on source port
randomization. (CVE-2020-25705)

Jinoh Kang discovered that the Xen event channel infrastructure in the
Linux kernel contained a race condition. An attacker in guest could
possibly use this to cause a denial of service (dom0 crash).
(CVE-2020-27675)

Daniel Axtens discovered that PowerPC RTAS implementation in the Linux
kernel did not properly restrict memory accesses in some situations. A
privileged local attacker could use this to arbitrarily modify kernel
memory, potentially bypassing kernel lockdown restrictions.
(CVE-2020-27777)

Minh Yuan discovered that the framebuffer console driver in the Linux
kernel did not properly handle fonts in some conditions. A local attacker
could use this to cause a denial of service (system crash) or possibly
expose sensitive information (kernel memory). (CVE-2020-28974)

Package Affected Version
pkg:deb/ubuntu/linux-image-virtual?distro=bionic < 4.15.0.129.116
pkg:deb/ubuntu/linux-image-virtual-hwe-16.04?distro=xenial < 4.15.0.129.128
pkg:deb/ubuntu/linux-image-virtual-hwe-16.04?distro=bionic < 4.15.0.129.116
pkg:deb/ubuntu/linux-image-virtual-hwe-16.04-edge?distro=xenial < 4.15.0.129.128
pkg:deb/ubuntu/linux-image-virtual-hwe-16.04-edge?distro=bionic < 4.15.0.129.116
pkg:deb/ubuntu/linux-image-snapdragon?distro=bionic < 4.15.0.1094.97
pkg:deb/ubuntu/linux-image-raspi2?distro=bionic < 4.15.0.1077.74
pkg:deb/ubuntu/linux-image-oracle?distro=xenial < 4.15.0.1062.51
pkg:deb/ubuntu/linux-image-oracle-lts-18.04?distro=bionic < 4.15.0.1062.72
pkg:deb/ubuntu/linux-image-oem?distro=xenial < 4.15.0.129.128
pkg:deb/ubuntu/linux-image-lowlatency?distro=bionic < 4.15.0.129.116
pkg:deb/ubuntu/linux-image-lowlatency-hwe-16.04?distro=xenial < 4.15.0.129.128
pkg:deb/ubuntu/linux-image-lowlatency-hwe-16.04?distro=bionic < 4.15.0.129.116
pkg:deb/ubuntu/linux-image-lowlatency-hwe-16.04-edge?distro=xenial < 4.15.0.129.128
pkg:deb/ubuntu/linux-image-lowlatency-hwe-16.04-edge?distro=bionic < 4.15.0.129.116
pkg:deb/ubuntu/linux-image-kvm?distro=bionic < 4.15.0.1082.78
pkg:deb/ubuntu/linux-image-gke?distro=xenial < 4.15.0.1091.92
pkg:deb/ubuntu/linux-image-gke?distro=bionic < 4.15.0.1077.81
pkg:deb/ubuntu/linux-image-gke-4.15?distro=bionic < 4.15.0.1077.81
pkg:deb/ubuntu/linux-image-generic?distro=bionic < 4.15.0.129.116
pkg:deb/ubuntu/linux-image-generic-lpae?distro=bionic < 4.15.0.129.116
pkg:deb/ubuntu/linux-image-generic-lpae-hwe-16.04?distro=xenial < 4.15.0.129.128
pkg:deb/ubuntu/linux-image-generic-lpae-hwe-16.04?distro=bionic < 4.15.0.129.116
pkg:deb/ubuntu/linux-image-generic-lpae-hwe-16.04-edge?distro=xenial < 4.15.0.129.128
pkg:deb/ubuntu/linux-image-generic-lpae-hwe-16.04-edge?distro=bionic < 4.15.0.129.116
pkg:deb/ubuntu/linux-image-generic-hwe-16.04?distro=xenial < 4.15.0.129.128
pkg:deb/ubuntu/linux-image-generic-hwe-16.04?distro=bionic < 4.15.0.129.116
pkg:deb/ubuntu/linux-image-generic-hwe-16.04-edge?distro=xenial < 4.15.0.129.128
pkg:deb/ubuntu/linux-image-generic-hwe-16.04-edge?distro=bionic < 4.15.0.129.116
pkg:deb/ubuntu/linux-image-gcp?distro=xenial < 4.15.0.1091.92
pkg:deb/ubuntu/linux-image-gcp-lts-18.04?distro=bionic < 4.15.0.1091.109
pkg:deb/ubuntu/linux-image-azure?distro=xenial < 4.15.0.1103.96
pkg:deb/ubuntu/linux-image-azure?distro=trusty < 4.15.0.1103.78
pkg:deb/ubuntu/linux-image-azure-lts-18.04?distro=bionic < 4.15.0.1103.76
pkg:deb/ubuntu/linux-image-azure-edge?distro=xenial < 4.15.0.1103.96
pkg:deb/ubuntu/linux-image-aws-lts-18.04?distro=bionic < 4.15.0.1091.93
pkg:deb/ubuntu/linux-image-aws-hwe?distro=xenial < 4.15.0.1091.85
pkg:deb/ubuntu/linux-image-4.15.0-129-lowlatency?distro=xenial < 4.15.0-129.132~16.04.1
pkg:deb/ubuntu/linux-image-4.15.0-129-lowlatency?distro=bionic < 4.15.0-129.132
pkg:deb/ubuntu/linux-image-4.15.0-129-generic?distro=xenial < 4.15.0-129.132~16.04.1
pkg:deb/ubuntu/linux-image-4.15.0-129-generic?distro=bionic < 4.15.0-129.132
pkg:deb/ubuntu/linux-image-4.15.0-129-generic-lpae?distro=xenial < 4.15.0-129.132~16.04.1
pkg:deb/ubuntu/linux-image-4.15.0-129-generic-lpae?distro=bionic < 4.15.0-129.132
pkg:deb/ubuntu/linux-image-4.15.0-1103-azure?distro=xenial < 4.15.0-1103.114~16.04.1
pkg:deb/ubuntu/linux-image-4.15.0-1103-azure?distro=trusty < 4.15.0-1103.114~14.04.1
pkg:deb/ubuntu/linux-image-4.15.0-1103-azure?distro=bionic < 4.15.0-1103.114
pkg:deb/ubuntu/linux-image-4.15.0-1094-snapdragon?distro=bionic < 4.15.0-1094.103
pkg:deb/ubuntu/linux-image-4.15.0-1091-gcp?distro=xenial < 4.15.0-1091.104~16.04.1
pkg:deb/ubuntu/linux-image-4.15.0-1091-gcp?distro=bionic < 4.15.0-1091.104
pkg:deb/ubuntu/linux-image-4.15.0-1091-aws?distro=xenial < 4.15.0-1091.96~16.04.1
pkg:deb/ubuntu/linux-image-4.15.0-1091-aws?distro=bionic < 4.15.0-1091.96
pkg:deb/ubuntu/linux-image-4.15.0-1082-kvm?distro=bionic < 4.15.0-1082.84
pkg:deb/ubuntu/linux-image-4.15.0-1077-raspi2?distro=bionic < 4.15.0-1077.82
pkg:deb/ubuntu/linux-image-4.15.0-1077-gke?distro=bionic < 4.15.0-1077.82
pkg:deb/ubuntu/linux-image-4.15.0-1062-oracle?distro=xenial < 4.15.0-1062.68~16.04.1
pkg:deb/ubuntu/linux-image-4.15.0-1062-oracle?distro=bionic < 4.15.0-1062.68
ID
USN-4680-1
Severity
medium
URL
https://ubuntu.com/security/notices/USN-4680-1
Published
2021-01-06T03:41:27
(3 years ago)
Modified
2021-01-06T03:41:27
(3 years ago)
Other Advisories
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:deb/ubuntu/linux-image-virtual?distro=bionic ubuntu linux-image-virtual < 4.15.0.129.116 bionic
Affected pkg:deb/ubuntu/linux-image-virtual-hwe-16.04?distro=xenial ubuntu linux-image-virtual-hwe-16.04 < 4.15.0.129.128 xenial
Affected pkg:deb/ubuntu/linux-image-virtual-hwe-16.04?distro=bionic ubuntu linux-image-virtual-hwe-16.04 < 4.15.0.129.116 bionic
Affected pkg:deb/ubuntu/linux-image-virtual-hwe-16.04-edge?distro=xenial ubuntu linux-image-virtual-hwe-16.04-edge < 4.15.0.129.128 xenial
Affected pkg:deb/ubuntu/linux-image-virtual-hwe-16.04-edge?distro=bionic ubuntu linux-image-virtual-hwe-16.04-edge < 4.15.0.129.116 bionic
Affected pkg:deb/ubuntu/linux-image-snapdragon?distro=bionic ubuntu linux-image-snapdragon < 4.15.0.1094.97 bionic
Affected pkg:deb/ubuntu/linux-image-raspi2?distro=bionic ubuntu linux-image-raspi2 < 4.15.0.1077.74 bionic
Affected pkg:deb/ubuntu/linux-image-oracle?distro=xenial ubuntu linux-image-oracle < 4.15.0.1062.51 xenial
Affected pkg:deb/ubuntu/linux-image-oracle-lts-18.04?distro=bionic ubuntu linux-image-oracle-lts-18.04 < 4.15.0.1062.72 bionic
Affected pkg:deb/ubuntu/linux-image-oem?distro=xenial ubuntu linux-image-oem < 4.15.0.129.128 xenial
Affected pkg:deb/ubuntu/linux-image-lowlatency?distro=bionic ubuntu linux-image-lowlatency < 4.15.0.129.116 bionic
Affected pkg:deb/ubuntu/linux-image-lowlatency-hwe-16.04?distro=xenial ubuntu linux-image-lowlatency-hwe-16.04 < 4.15.0.129.128 xenial
Affected pkg:deb/ubuntu/linux-image-lowlatency-hwe-16.04?distro=bionic ubuntu linux-image-lowlatency-hwe-16.04 < 4.15.0.129.116 bionic
Affected pkg:deb/ubuntu/linux-image-lowlatency-hwe-16.04-edge?distro=xenial ubuntu linux-image-lowlatency-hwe-16.04-edge < 4.15.0.129.128 xenial
Affected pkg:deb/ubuntu/linux-image-lowlatency-hwe-16.04-edge?distro=bionic ubuntu linux-image-lowlatency-hwe-16.04-edge < 4.15.0.129.116 bionic
Affected pkg:deb/ubuntu/linux-image-kvm?distro=bionic ubuntu linux-image-kvm < 4.15.0.1082.78 bionic
Affected pkg:deb/ubuntu/linux-image-gke?distro=xenial ubuntu linux-image-gke < 4.15.0.1091.92 xenial
Affected pkg:deb/ubuntu/linux-image-gke?distro=bionic ubuntu linux-image-gke < 4.15.0.1077.81 bionic
Affected pkg:deb/ubuntu/linux-image-gke-4.15?distro=bionic ubuntu linux-image-gke-4.15 < 4.15.0.1077.81 bionic
Affected pkg:deb/ubuntu/linux-image-generic?distro=bionic ubuntu linux-image-generic < 4.15.0.129.116 bionic
Affected pkg:deb/ubuntu/linux-image-generic-lpae?distro=bionic ubuntu linux-image-generic-lpae < 4.15.0.129.116 bionic
Affected pkg:deb/ubuntu/linux-image-generic-lpae-hwe-16.04?distro=xenial ubuntu linux-image-generic-lpae-hwe-16.04 < 4.15.0.129.128 xenial
Affected pkg:deb/ubuntu/linux-image-generic-lpae-hwe-16.04?distro=bionic ubuntu linux-image-generic-lpae-hwe-16.04 < 4.15.0.129.116 bionic
Affected pkg:deb/ubuntu/linux-image-generic-lpae-hwe-16.04-edge?distro=xenial ubuntu linux-image-generic-lpae-hwe-16.04-edge < 4.15.0.129.128 xenial
Affected pkg:deb/ubuntu/linux-image-generic-lpae-hwe-16.04-edge?distro=bionic ubuntu linux-image-generic-lpae-hwe-16.04-edge < 4.15.0.129.116 bionic
Affected pkg:deb/ubuntu/linux-image-generic-hwe-16.04?distro=xenial ubuntu linux-image-generic-hwe-16.04 < 4.15.0.129.128 xenial
Affected pkg:deb/ubuntu/linux-image-generic-hwe-16.04?distro=bionic ubuntu linux-image-generic-hwe-16.04 < 4.15.0.129.116 bionic
Affected pkg:deb/ubuntu/linux-image-generic-hwe-16.04-edge?distro=xenial ubuntu linux-image-generic-hwe-16.04-edge < 4.15.0.129.128 xenial
Affected pkg:deb/ubuntu/linux-image-generic-hwe-16.04-edge?distro=bionic ubuntu linux-image-generic-hwe-16.04-edge < 4.15.0.129.116 bionic
Affected pkg:deb/ubuntu/linux-image-gcp?distro=xenial ubuntu linux-image-gcp < 4.15.0.1091.92 xenial
Affected pkg:deb/ubuntu/linux-image-gcp-lts-18.04?distro=bionic ubuntu linux-image-gcp-lts-18.04 < 4.15.0.1091.109 bionic
Affected pkg:deb/ubuntu/linux-image-azure?distro=xenial ubuntu linux-image-azure < 4.15.0.1103.96 xenial
Affected pkg:deb/ubuntu/linux-image-azure?distro=trusty ubuntu linux-image-azure < 4.15.0.1103.78 trusty
Affected pkg:deb/ubuntu/linux-image-azure-lts-18.04?distro=bionic ubuntu linux-image-azure-lts-18.04 < 4.15.0.1103.76 bionic
Affected pkg:deb/ubuntu/linux-image-azure-edge?distro=xenial ubuntu linux-image-azure-edge < 4.15.0.1103.96 xenial
Affected pkg:deb/ubuntu/linux-image-aws-lts-18.04?distro=bionic ubuntu linux-image-aws-lts-18.04 < 4.15.0.1091.93 bionic
Affected pkg:deb/ubuntu/linux-image-aws-hwe?distro=xenial ubuntu linux-image-aws-hwe < 4.15.0.1091.85 xenial
Affected pkg:deb/ubuntu/linux-image-4.15.0-129-lowlatency?distro=xenial ubuntu linux-image-4.15.0-129-lowlatency < 4.15.0-129.132~16.04.1 xenial
Affected pkg:deb/ubuntu/linux-image-4.15.0-129-lowlatency?distro=bionic ubuntu linux-image-4.15.0-129-lowlatency < 4.15.0-129.132 bionic
Affected pkg:deb/ubuntu/linux-image-4.15.0-129-generic?distro=xenial ubuntu linux-image-4.15.0-129-generic < 4.15.0-129.132~16.04.1 xenial
Affected pkg:deb/ubuntu/linux-image-4.15.0-129-generic?distro=bionic ubuntu linux-image-4.15.0-129-generic < 4.15.0-129.132 bionic
Affected pkg:deb/ubuntu/linux-image-4.15.0-129-generic-lpae?distro=xenial ubuntu linux-image-4.15.0-129-generic-lpae < 4.15.0-129.132~16.04.1 xenial
Affected pkg:deb/ubuntu/linux-image-4.15.0-129-generic-lpae?distro=bionic ubuntu linux-image-4.15.0-129-generic-lpae < 4.15.0-129.132 bionic
Affected pkg:deb/ubuntu/linux-image-4.15.0-1103-azure?distro=xenial ubuntu linux-image-4.15.0-1103-azure < 4.15.0-1103.114~16.04.1 xenial
Affected pkg:deb/ubuntu/linux-image-4.15.0-1103-azure?distro=trusty ubuntu linux-image-4.15.0-1103-azure < 4.15.0-1103.114~14.04.1 trusty
Affected pkg:deb/ubuntu/linux-image-4.15.0-1103-azure?distro=bionic ubuntu linux-image-4.15.0-1103-azure < 4.15.0-1103.114 bionic
Affected pkg:deb/ubuntu/linux-image-4.15.0-1094-snapdragon?distro=bionic ubuntu linux-image-4.15.0-1094-snapdragon < 4.15.0-1094.103 bionic
Affected pkg:deb/ubuntu/linux-image-4.15.0-1091-gcp?distro=xenial ubuntu linux-image-4.15.0-1091-gcp < 4.15.0-1091.104~16.04.1 xenial
Affected pkg:deb/ubuntu/linux-image-4.15.0-1091-gcp?distro=bionic ubuntu linux-image-4.15.0-1091-gcp < 4.15.0-1091.104 bionic
Affected pkg:deb/ubuntu/linux-image-4.15.0-1091-aws?distro=xenial ubuntu linux-image-4.15.0-1091-aws < 4.15.0-1091.96~16.04.1 xenial
Affected pkg:deb/ubuntu/linux-image-4.15.0-1091-aws?distro=bionic ubuntu linux-image-4.15.0-1091-aws < 4.15.0-1091.96 bionic
Affected pkg:deb/ubuntu/linux-image-4.15.0-1082-kvm?distro=bionic ubuntu linux-image-4.15.0-1082-kvm < 4.15.0-1082.84 bionic
Affected pkg:deb/ubuntu/linux-image-4.15.0-1077-raspi2?distro=bionic ubuntu linux-image-4.15.0-1077-raspi2 < 4.15.0-1077.82 bionic
Affected pkg:deb/ubuntu/linux-image-4.15.0-1077-gke?distro=bionic ubuntu linux-image-4.15.0-1077-gke < 4.15.0-1077.82 bionic
Affected pkg:deb/ubuntu/linux-image-4.15.0-1062-oracle?distro=xenial ubuntu linux-image-4.15.0-1062-oracle < 4.15.0-1062.68~16.04.1 xenial
Affected pkg:deb/ubuntu/linux-image-4.15.0-1062-oracle?distro=bionic ubuntu linux-image-4.15.0-1062-oracle < 4.15.0-1062.68 bionic
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...