[USN-4680-1] Linux kernel vulnerabilities
Several security issues were fixed in the Linux kernel.
It was discovered that debugfs in the Linux kernel as used by blktrace
contained a use-after-free in some situations. A privileged local attacker
could possibly use this to cause a denial of service (system crash).
(CVE-2019-19770)
It was discovered that a race condition existed in the binder IPC
implementation in the Linux kernel, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2020-0423)
Daniele Antonioli, Nils Ole Tippenhauer, and Kasper Rasmussen discovered
that legacy pairing and secure-connections pairing authentication in the
Bluetooth protocol could allow an unauthenticated user to complete
authentication without pairing credentials via adjacent access. A
physically proximate attacker could use this to impersonate a previously
paired Bluetooth device. (CVE-2020-10135)
It was discovered that the console keyboard driver in the Linux kernel
contained a race condition. A local attacker could use this to expose
sensitive information (kernel memory). (CVE-2020-25656)
Minh Yuan discovered that the tty driver in the Linux kernel contained race
conditions when handling fonts. A local attacker could possibly use this to
expose sensitive information (kernel memory). (CVE-2020-25668)
Keyu Man discovered that the ICMP global rate limiter in the Linux kernel
could be used to assist in scanning open UDP ports. A remote attacker could
use to facilitate attacks on UDP based services that depend on source port
randomization. (CVE-2020-25705)
Jinoh Kang discovered that the Xen event channel infrastructure in the
Linux kernel contained a race condition. An attacker in guest could
possibly use this to cause a denial of service (dom0 crash).
(CVE-2020-27675)
Daniel Axtens discovered that PowerPC RTAS implementation in the Linux
kernel did not properly restrict memory accesses in some situations. A
privileged local attacker could use this to arbitrarily modify kernel
memory, potentially bypassing kernel lockdown restrictions.
(CVE-2020-27777)
Minh Yuan discovered that the framebuffer console driver in the Linux
kernel did not properly handle fonts in some conditions. A local attacker
could use this to cause a denial of service (system crash) or possibly
expose sensitive information (kernel memory). (CVE-2020-28974)
- ID
- USN-4680-1
- Severity
- medium
- URL
- https://ubuntu.com/security/notices/USN-4680-1
- Published
-
2021-01-06T03:41:27
(3 years ago) - Modified
-
2021-01-06T03:41:27
(3 years ago) - Other Advisories
-
- ALAS-2020-1446
- ALAS-2021-1461
- ALAS2-2020-1556
- ALAS2-2020-1566
- ALSA-2020:4431
- ALSA-2021:0558
- ALSA-2021:1578
- ALSA-2021:4356
- ALSA-2024:3138
- ASB-A-161151868
- ASB-A-174737972
- ELSA-2020-5995
- ELSA-2020-5996
- ELSA-2021-0558
- ELSA-2021-0856
- ELSA-2021-1578
- ELSA-2021-3327
- ELSA-2021-4356
- ELSA-2021-9001
- ELSA-2021-9002
- ELSA-2021-9006
- ELSA-2021-9007
- ELSA-2021-9043
- ELSA-2024-3138
- FEDORA-2020-09e4d062fe
- FEDORA-2020-474d747b60
- FEDORA-2020-920a258c79
- FEDORA-2020-98ccae320c
- FEDORA-2020-e211716d08
- GLSA-202011-06
- MS:CVE-2020-25656
- MS:CVE-2020-25705
- MS:CVE-2020-27675
- MS:CVE-2020-27777
- MS:CVE-2020-28974
- openSUSE-SU-2020:0543-1
- openSUSE-SU-2020:1153-1
- openSUSE-SU-2020:1236-1
- openSUSE-SU-2020:1906-1
- openSUSE-SU-2020:2034-1
- openSUSE-SU-2020:2112-1
- openSUSE-SU-2020:2161-1
- openSUSE-SU-2020:2193-1
- openSUSE-SU-2020:2260-1
- openSUSE-SU-2021:0060-1
- openSUSE-SU-2021:0075-1
- openSUSE-SU-2021:0242-1
- RHSA-2020:4431
- RHSA-2020:4609
- RHSA-2021:0537
- RHSA-2021:0558
- RHSA-2021:0856
- RHSA-2021:0857
- RHSA-2021:1578
- RHSA-2021:1739
- RHSA-2021:3327
- RHSA-2021:4356
- RHSA-2024:2950
- RHSA-2024:3138
- RLSA-2024:3138
- SUSE-SU-2020:1084-1
- SUSE-SU-2020:1085-1
- SUSE-SU-2020:1087-1
- SUSE-SU-2020:1118-1
- SUSE-SU-2020:1119-1
- SUSE-SU-2020:1123-1
- SUSE-SU-2020:1141-1
- SUSE-SU-2020:1142-1
- SUSE-SU-2020:1146-1
- SUSE-SU-2020:1663-1
- SUSE-SU-2020:2102-1
- SUSE-SU-2020:2105-1
- SUSE-SU-2020:2119-1
- SUSE-SU-2020:2122-1
- SUSE-SU-2020:2134-1
- SUSE-SU-2020:2152-1
- SUSE-SU-2020:2487-1
- SUSE-SU-2020:2541-1
- SUSE-SU-2020:2575-1
- SUSE-SU-2020:2605-1
- SUSE-SU-2020:2610-1
- SUSE-SU-2020:2623-1
- SUSE-SU-2020:3272-1
- SUSE-SU-2020:3273-1
- SUSE-SU-2020:3281-1
- SUSE-SU-2020:3326-1
- SUSE-SU-2020:3484-1
- SUSE-SU-2020:3491-1
- SUSE-SU-2020:3501-1
- SUSE-SU-2020:3503-1
- SUSE-SU-2020:3507-1
- SUSE-SU-2020:3512-1
- SUSE-SU-2020:3513-1
- SUSE-SU-2020:3522-1
- SUSE-SU-2020:3532-1
- SUSE-SU-2020:3544-1
- SUSE-SU-2020:3648-1
- SUSE-SU-2020:3651-1
- SUSE-SU-2020:3670-1
- SUSE-SU-2020:3690-1
- SUSE-SU-2020:3698-1
- SUSE-SU-2020:3713-1
- SUSE-SU-2020:3714-1
- SUSE-SU-2020:3715-1
- SUSE-SU-2020:3717-1
- SUSE-SU-2020:3718-1
- SUSE-SU-2020:3748-1
- SUSE-SU-2020:3764-1
- SUSE-SU-2020:3766-1
- SUSE-SU-2020:3798-1
- SUSE-SU-2021:0094-1
- SUSE-SU-2021:0095-1
- SUSE-SU-2021:0097-1
- SUSE-SU-2021:0098-1
- SUSE-SU-2021:0108-1
- SUSE-SU-2021:0117-1
- SUSE-SU-2021:0118-1
- SUSE-SU-2021:0133-1
- SUSE-SU-2021:0434-1
- SUSE-SU-2021:0437-1
- SUSE-SU-2021:0438-1
- SUSE-SU-2021:0452-1
- SUSE-SU-2024:2360-1
- SUSE-SU-2024:2365-1
- SUSE-SU-2024:2561-1
- USN-4657-1
- USN-4658-1
- USN-4659-1
- USN-4679-1
- USN-4681-1
- USN-4683-1
- USN-4708-1
- USN-4751-1
- USN-4752-1
- USN-4912-1
- VU:647177
- XSA-331
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:deb/ubuntu/linux-image-virtual?distro=bionic | ubuntu | linux-image-virtual | < 4.15.0.129.116 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-virtual-hwe-16.04?distro=xenial | ubuntu | linux-image-virtual-hwe-16.04 | < 4.15.0.129.128 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-virtual-hwe-16.04?distro=bionic | ubuntu | linux-image-virtual-hwe-16.04 | < 4.15.0.129.116 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-virtual-hwe-16.04-edge?distro=xenial | ubuntu | linux-image-virtual-hwe-16.04-edge | < 4.15.0.129.128 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-virtual-hwe-16.04-edge?distro=bionic | ubuntu | linux-image-virtual-hwe-16.04-edge | < 4.15.0.129.116 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-snapdragon?distro=bionic | ubuntu | linux-image-snapdragon | < 4.15.0.1094.97 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-raspi2?distro=bionic | ubuntu | linux-image-raspi2 | < 4.15.0.1077.74 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-oracle?distro=xenial | ubuntu | linux-image-oracle | < 4.15.0.1062.51 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-oracle-lts-18.04?distro=bionic | ubuntu | linux-image-oracle-lts-18.04 | < 4.15.0.1062.72 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-oem?distro=xenial | ubuntu | linux-image-oem | < 4.15.0.129.128 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency?distro=bionic | ubuntu | linux-image-lowlatency | < 4.15.0.129.116 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency-hwe-16.04?distro=xenial | ubuntu | linux-image-lowlatency-hwe-16.04 | < 4.15.0.129.128 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency-hwe-16.04?distro=bionic | ubuntu | linux-image-lowlatency-hwe-16.04 | < 4.15.0.129.116 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency-hwe-16.04-edge?distro=xenial | ubuntu | linux-image-lowlatency-hwe-16.04-edge | < 4.15.0.129.128 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency-hwe-16.04-edge?distro=bionic | ubuntu | linux-image-lowlatency-hwe-16.04-edge | < 4.15.0.129.116 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-kvm?distro=bionic | ubuntu | linux-image-kvm | < 4.15.0.1082.78 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-gke?distro=xenial | ubuntu | linux-image-gke | < 4.15.0.1091.92 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-gke?distro=bionic | ubuntu | linux-image-gke | < 4.15.0.1077.81 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-gke-4.15?distro=bionic | ubuntu | linux-image-gke-4.15 | < 4.15.0.1077.81 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-generic?distro=bionic | ubuntu | linux-image-generic | < 4.15.0.129.116 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae?distro=bionic | ubuntu | linux-image-generic-lpae | < 4.15.0.129.116 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae-hwe-16.04?distro=xenial | ubuntu | linux-image-generic-lpae-hwe-16.04 | < 4.15.0.129.128 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae-hwe-16.04?distro=bionic | ubuntu | linux-image-generic-lpae-hwe-16.04 | < 4.15.0.129.116 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae-hwe-16.04-edge?distro=xenial | ubuntu | linux-image-generic-lpae-hwe-16.04-edge | < 4.15.0.129.128 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae-hwe-16.04-edge?distro=bionic | ubuntu | linux-image-generic-lpae-hwe-16.04-edge | < 4.15.0.129.116 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-generic-hwe-16.04?distro=xenial | ubuntu | linux-image-generic-hwe-16.04 | < 4.15.0.129.128 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-generic-hwe-16.04?distro=bionic | ubuntu | linux-image-generic-hwe-16.04 | < 4.15.0.129.116 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-generic-hwe-16.04-edge?distro=xenial | ubuntu | linux-image-generic-hwe-16.04-edge | < 4.15.0.129.128 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-generic-hwe-16.04-edge?distro=bionic | ubuntu | linux-image-generic-hwe-16.04-edge | < 4.15.0.129.116 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-gcp?distro=xenial | ubuntu | linux-image-gcp | < 4.15.0.1091.92 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-gcp-lts-18.04?distro=bionic | ubuntu | linux-image-gcp-lts-18.04 | < 4.15.0.1091.109 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-azure?distro=xenial | ubuntu | linux-image-azure | < 4.15.0.1103.96 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-azure?distro=trusty | ubuntu | linux-image-azure | < 4.15.0.1103.78 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-azure-lts-18.04?distro=bionic | ubuntu | linux-image-azure-lts-18.04 | < 4.15.0.1103.76 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-azure-edge?distro=xenial | ubuntu | linux-image-azure-edge | < 4.15.0.1103.96 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-aws-lts-18.04?distro=bionic | ubuntu | linux-image-aws-lts-18.04 | < 4.15.0.1091.93 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-aws-hwe?distro=xenial | ubuntu | linux-image-aws-hwe | < 4.15.0.1091.85 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.15.0-129-lowlatency?distro=xenial | ubuntu | linux-image-4.15.0-129-lowlatency | < 4.15.0-129.132~16.04.1 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.15.0-129-lowlatency?distro=bionic | ubuntu | linux-image-4.15.0-129-lowlatency | < 4.15.0-129.132 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-4.15.0-129-generic?distro=xenial | ubuntu | linux-image-4.15.0-129-generic | < 4.15.0-129.132~16.04.1 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.15.0-129-generic?distro=bionic | ubuntu | linux-image-4.15.0-129-generic | < 4.15.0-129.132 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-4.15.0-129-generic-lpae?distro=xenial | ubuntu | linux-image-4.15.0-129-generic-lpae | < 4.15.0-129.132~16.04.1 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.15.0-129-generic-lpae?distro=bionic | ubuntu | linux-image-4.15.0-129-generic-lpae | < 4.15.0-129.132 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-4.15.0-1103-azure?distro=xenial | ubuntu | linux-image-4.15.0-1103-azure | < 4.15.0-1103.114~16.04.1 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.15.0-1103-azure?distro=trusty | ubuntu | linux-image-4.15.0-1103-azure | < 4.15.0-1103.114~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-4.15.0-1103-azure?distro=bionic | ubuntu | linux-image-4.15.0-1103-azure | < 4.15.0-1103.114 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-4.15.0-1094-snapdragon?distro=bionic | ubuntu | linux-image-4.15.0-1094-snapdragon | < 4.15.0-1094.103 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-4.15.0-1091-gcp?distro=xenial | ubuntu | linux-image-4.15.0-1091-gcp | < 4.15.0-1091.104~16.04.1 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.15.0-1091-gcp?distro=bionic | ubuntu | linux-image-4.15.0-1091-gcp | < 4.15.0-1091.104 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-4.15.0-1091-aws?distro=xenial | ubuntu | linux-image-4.15.0-1091-aws | < 4.15.0-1091.96~16.04.1 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.15.0-1091-aws?distro=bionic | ubuntu | linux-image-4.15.0-1091-aws | < 4.15.0-1091.96 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-4.15.0-1082-kvm?distro=bionic | ubuntu | linux-image-4.15.0-1082-kvm | < 4.15.0-1082.84 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-4.15.0-1077-raspi2?distro=bionic | ubuntu | linux-image-4.15.0-1077-raspi2 | < 4.15.0-1077.82 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-4.15.0-1077-gke?distro=bionic | ubuntu | linux-image-4.15.0-1077-gke | < 4.15.0-1077.82 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-4.15.0-1062-oracle?distro=xenial | ubuntu | linux-image-4.15.0-1062-oracle | < 4.15.0-1062.68~16.04.1 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.15.0-1062-oracle?distro=bionic | ubuntu | linux-image-4.15.0-1062-oracle | < 4.15.0-1062.68 | bionic |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |