[USN-4681-1] Linux kernel vulnerabilities
Several security issues were fixed in the Linux kernel.
Ryan Hall discovered that the Intel 700 Series Ethernet Controllers driver
in the Linux kernel did not properly deallocate memory in some conditions.
A local attacker could use this to cause a denial of service (kernel memory
exhaustion). (CVE-2019-0148)
It was discovered that the console keyboard driver in the Linux kernel
contained a race condition. A local attacker could use this to expose
sensitive information (kernel memory). (CVE-2020-25656)
Minh Yuan discovered that the tty driver in the Linux kernel contained race
conditions when handling fonts. A local attacker could possibly use this to
expose sensitive information (kernel memory). (CVE-2020-25668)
Jinoh Kang discovered that the Xen event channel infrastructure in the
Linux kernel contained a race condition. An attacker in guest could
possibly use this to cause a denial of service (dom0 crash).
(CVE-2020-27675)
Minh Yuan discovered that the framebuffer console driver in the Linux
kernel did not properly handle fonts in some conditions. A local attacker
could use this to cause a denial of service (system crash) or possibly
expose sensitive information (kernel memory). (CVE-2020-28974)
It was discovered that Power 9 processors could be coerced to expose
information from the L1 cache in certain situations. A local attacker could
use this to expose sensitive information. (CVE-2020-4788)
- ID
- USN-4681-1
- Severity
- medium
- URL
- https://ubuntu.com/security/notices/USN-4681-1
- Published
-
2021-01-06T03:35:10
(3 years ago) - Modified
-
2021-01-06T03:35:10
(3 years ago) - Other Advisories
-
- ALAS-2021-1461
- ALAS2-2020-1566
- ALSA-2021:1578
- ALSA-2022:1988
- ALSA-2024:3138
- ELSA-2020-5995
- ELSA-2020-5996
- ELSA-2021-0856
- ELSA-2021-1578
- ELSA-2021-9001
- ELSA-2021-9002
- ELSA-2021-9043
- ELSA-2021-9305
- ELSA-2021-9308
- ELSA-2022-1988
- ELSA-2024-3138
- FEDORA-2020-09e4d062fe
- FEDORA-2020-4700a73bd5
- FEDORA-2020-474d747b60
- FEDORA-2020-8c15928d23
- FEDORA-2020-920a258c79
- FEDORA-2020-98ccae320c
- FEDORA-2020-e211716d08
- GLSA-202011-06
- MS:CVE-2020-25656
- MS:CVE-2020-27675
- MS:CVE-2020-28974
- openSUSE-SU-2020:1906-1
- openSUSE-SU-2020:2112-1
- openSUSE-SU-2020:2161-1
- openSUSE-SU-2020:2193-1
- openSUSE-SU-2020:2260-1
- openSUSE-SU-2021:0075-1
- openSUSE-SU-2021:0242-1
- openSUSE-SU-2021:3876-1
- RHSA-2021:0856
- RHSA-2021:0857
- RHSA-2021:1578
- RHSA-2021:1739
- RHSA-2022:1988
- RHSA-2024:2950
- RHSA-2024:3138
- RLSA-2022:1988
- RLSA-2024:3138
- SUSE-SU-2020:3272-1
- SUSE-SU-2020:3273-1
- SUSE-SU-2020:3281-1
- SUSE-SU-2020:3326-1
- SUSE-SU-2020:3484-1
- SUSE-SU-2020:3491-1
- SUSE-SU-2020:3501-1
- SUSE-SU-2020:3503-1
- SUSE-SU-2020:3507-1
- SUSE-SU-2020:3512-1
- SUSE-SU-2020:3513-1
- SUSE-SU-2020:3522-1
- SUSE-SU-2020:3532-1
- SUSE-SU-2020:3544-1
- SUSE-SU-2020:3648-1
- SUSE-SU-2020:3651-1
- SUSE-SU-2020:3670-1
- SUSE-SU-2020:3690-1
- SUSE-SU-2020:3698-1
- SUSE-SU-2020:3713-1
- SUSE-SU-2020:3714-1
- SUSE-SU-2020:3715-1
- SUSE-SU-2020:3717-1
- SUSE-SU-2020:3718-1
- SUSE-SU-2020:3748-1
- SUSE-SU-2020:3764-1
- SUSE-SU-2020:3766-1
- SUSE-SU-2020:3798-1
- SUSE-SU-2021:0097-1
- SUSE-SU-2021:0098-1
- SUSE-SU-2021:0118-1
- SUSE-SU-2021:0133-1
- SUSE-SU-2021:0434-1
- SUSE-SU-2021:0437-1
- SUSE-SU-2021:0438-1
- SUSE-SU-2021:0452-1
- SUSE-SU-2021:3876-1
- SUSE-SU-2021:3935-1
- USN-4657-1
- USN-4658-1
- USN-4659-1
- USN-4660-1
- USN-4679-1
- USN-4680-1
- USN-4683-1
- USN-4751-1
- XSA-331
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:deb/ubuntu/linux-image-virtual?distro=xenial | ubuntu | linux-image-virtual | < 4.4.0.198.204 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-virtual-lts-xenial?distro=xenial | ubuntu | linux-image-virtual-lts-xenial | < 4.4.0.198.204 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-virtual-lts-xenial?distro=trusty | ubuntu | linux-image-virtual-lts-xenial | < 4.4.0.198.173 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-virtual-lts-wily?distro=xenial | ubuntu | linux-image-virtual-lts-wily | < 4.4.0.198.204 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-virtual-lts-vivid?distro=xenial | ubuntu | linux-image-virtual-lts-vivid | < 4.4.0.198.204 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-virtual-lts-utopic?distro=xenial | ubuntu | linux-image-virtual-lts-utopic | < 4.4.0.198.204 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-snapdragon?distro=xenial | ubuntu | linux-image-snapdragon | < 4.4.0.1147.139 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-raspi2?distro=xenial | ubuntu | linux-image-raspi2 | < 4.4.0.1143.143 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc64-smp?distro=xenial | ubuntu | linux-image-powerpc64-smp | < 4.4.0.198.204 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc64-smp-lts-xenial?distro=xenial | ubuntu | linux-image-powerpc64-smp-lts-xenial | < 4.4.0.198.204 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc64-smp-lts-xenial?distro=trusty | ubuntu | linux-image-powerpc64-smp-lts-xenial | < 4.4.0.198.173 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc64-smp-lts-wily?distro=xenial | ubuntu | linux-image-powerpc64-smp-lts-wily | < 4.4.0.198.204 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc64-smp-lts-vivid?distro=xenial | ubuntu | linux-image-powerpc64-smp-lts-vivid | < 4.4.0.198.204 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc64-smp-lts-utopic?distro=xenial | ubuntu | linux-image-powerpc64-smp-lts-utopic | < 4.4.0.198.204 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc64-emb?distro=xenial | ubuntu | linux-image-powerpc64-emb | < 4.4.0.198.204 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc64-emb-lts-xenial?distro=xenial | ubuntu | linux-image-powerpc64-emb-lts-xenial | < 4.4.0.198.204 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc64-emb-lts-xenial?distro=trusty | ubuntu | linux-image-powerpc64-emb-lts-xenial | < 4.4.0.198.173 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc64-emb-lts-wily?distro=xenial | ubuntu | linux-image-powerpc64-emb-lts-wily | < 4.4.0.198.204 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc64-emb-lts-vivid?distro=xenial | ubuntu | linux-image-powerpc64-emb-lts-vivid | < 4.4.0.198.204 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc64-emb-lts-utopic?distro=xenial | ubuntu | linux-image-powerpc64-emb-lts-utopic | < 4.4.0.198.204 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-smp?distro=xenial | ubuntu | linux-image-powerpc-smp | < 4.4.0.198.204 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-smp-lts-xenial?distro=xenial | ubuntu | linux-image-powerpc-smp-lts-xenial | < 4.4.0.198.204 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-smp-lts-xenial?distro=trusty | ubuntu | linux-image-powerpc-smp-lts-xenial | < 4.4.0.198.173 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-smp-lts-wily?distro=xenial | ubuntu | linux-image-powerpc-smp-lts-wily | < 4.4.0.198.204 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-smp-lts-vivid?distro=xenial | ubuntu | linux-image-powerpc-smp-lts-vivid | < 4.4.0.198.204 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-smp-lts-utopic?distro=xenial | ubuntu | linux-image-powerpc-smp-lts-utopic | < 4.4.0.198.204 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-e500mc?distro=xenial | ubuntu | linux-image-powerpc-e500mc | < 4.4.0.198.204 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-e500mc-lts-xenial?distro=xenial | ubuntu | linux-image-powerpc-e500mc-lts-xenial | < 4.4.0.198.204 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-e500mc-lts-xenial?distro=trusty | ubuntu | linux-image-powerpc-e500mc-lts-xenial | < 4.4.0.198.173 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-e500mc-lts-wily?distro=xenial | ubuntu | linux-image-powerpc-e500mc-lts-wily | < 4.4.0.198.204 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-e500mc-lts-vivid?distro=xenial | ubuntu | linux-image-powerpc-e500mc-lts-vivid | < 4.4.0.198.204 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-e500mc-lts-utopic?distro=xenial | ubuntu | linux-image-powerpc-e500mc-lts-utopic | < 4.4.0.198.204 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency?distro=xenial | ubuntu | linux-image-lowlatency | < 4.4.0.198.204 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency-lts-xenial?distro=xenial | ubuntu | linux-image-lowlatency-lts-xenial | < 4.4.0.198.204 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency-lts-xenial?distro=trusty | ubuntu | linux-image-lowlatency-lts-xenial | < 4.4.0.198.173 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency-lts-wily?distro=xenial | ubuntu | linux-image-lowlatency-lts-wily | < 4.4.0.198.204 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency-lts-vivid?distro=xenial | ubuntu | linux-image-lowlatency-lts-vivid | < 4.4.0.198.204 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency-lts-utopic?distro=xenial | ubuntu | linux-image-lowlatency-lts-utopic | < 4.4.0.198.204 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-kvm?distro=xenial | ubuntu | linux-image-kvm | < 4.4.0.1085.83 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-generic?distro=xenial | ubuntu | linux-image-generic | < 4.4.0.198.204 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lts-xenial?distro=xenial | ubuntu | linux-image-generic-lts-xenial | < 4.4.0.198.204 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lts-xenial?distro=trusty | ubuntu | linux-image-generic-lts-xenial | < 4.4.0.198.173 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lts-wily?distro=xenial | ubuntu | linux-image-generic-lts-wily | < 4.4.0.198.204 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lts-vivid?distro=xenial | ubuntu | linux-image-generic-lts-vivid | < 4.4.0.198.204 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lts-utopic?distro=xenial | ubuntu | linux-image-generic-lts-utopic | < 4.4.0.198.204 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae?distro=xenial | ubuntu | linux-image-generic-lpae | < 4.4.0.198.204 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae-lts-xenial?distro=xenial | ubuntu | linux-image-generic-lpae-lts-xenial | < 4.4.0.198.204 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae-lts-xenial?distro=trusty | ubuntu | linux-image-generic-lpae-lts-xenial | < 4.4.0.198.173 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae-lts-wily?distro=xenial | ubuntu | linux-image-generic-lpae-lts-wily | < 4.4.0.198.204 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae-lts-vivid?distro=xenial | ubuntu | linux-image-generic-lpae-lts-vivid | < 4.4.0.198.204 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae-lts-utopic?distro=xenial | ubuntu | linux-image-generic-lpae-lts-utopic | < 4.4.0.198.204 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-aws?distro=xenial | ubuntu | linux-image-aws | < 4.4.0.1119.124 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-aws?distro=trusty | ubuntu | linux-image-aws | < 4.4.0.1083.80 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-198-powerpc64-smp?distro=xenial | ubuntu | linux-image-4.4.0-198-powerpc64-smp | < 4.4.0-198.230 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-198-powerpc64-smp?distro=trusty | ubuntu | linux-image-4.4.0-198-powerpc64-smp | < 4.4.0-198.230~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-198-powerpc64-emb?distro=xenial | ubuntu | linux-image-4.4.0-198-powerpc64-emb | < 4.4.0-198.230 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-198-powerpc64-emb?distro=trusty | ubuntu | linux-image-4.4.0-198-powerpc64-emb | < 4.4.0-198.230~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-198-powerpc-smp?distro=xenial | ubuntu | linux-image-4.4.0-198-powerpc-smp | < 4.4.0-198.230 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-198-powerpc-smp?distro=trusty | ubuntu | linux-image-4.4.0-198-powerpc-smp | < 4.4.0-198.230~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-198-powerpc-e500mc?distro=xenial | ubuntu | linux-image-4.4.0-198-powerpc-e500mc | < 4.4.0-198.230 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-198-powerpc-e500mc?distro=trusty | ubuntu | linux-image-4.4.0-198-powerpc-e500mc | < 4.4.0-198.230~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-198-lowlatency?distro=xenial | ubuntu | linux-image-4.4.0-198-lowlatency | < 4.4.0-198.230 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-198-lowlatency?distro=trusty | ubuntu | linux-image-4.4.0-198-lowlatency | < 4.4.0-198.230~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-198-generic?distro=xenial | ubuntu | linux-image-4.4.0-198-generic | < 4.4.0-198.230 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-198-generic?distro=trusty | ubuntu | linux-image-4.4.0-198-generic | < 4.4.0-198.230~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-198-generic-lpae?distro=xenial | ubuntu | linux-image-4.4.0-198-generic-lpae | < 4.4.0-198.230 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-198-generic-lpae?distro=trusty | ubuntu | linux-image-4.4.0-198-generic-lpae | < 4.4.0-198.230~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-1147-snapdragon?distro=xenial | ubuntu | linux-image-4.4.0-1147-snapdragon | < 4.4.0-1147.157 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-1143-raspi2?distro=xenial | ubuntu | linux-image-4.4.0-1143-raspi2 | < 4.4.0-1143.153 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-1119-aws?distro=xenial | ubuntu | linux-image-4.4.0-1119-aws | < 4.4.0-1119.133 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-1085-kvm?distro=xenial | ubuntu | linux-image-4.4.0-1085-kvm | < 4.4.0-1085.94 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-1083-aws?distro=trusty | ubuntu | linux-image-4.4.0-1083-aws | < 4.4.0-1083.87 | trusty |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |