Risk | High |
Patch available | YES |
Number of vulnerabilities | 5 |
CVE-ID | CVE-2018-13093 CVE-2019-19813 CVE-2019-19816 CVE-2020-25669 CVE-2020-27777 |
CWE-ID | CWE-476 CWE-416 CWE-787 CWE-862 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
Ubuntu Operating systems & Components / Operating system linux-image-virtual-lts-xenial (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-powerpc64-smp-lts-xenial (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-powerpc64-emb-lts-xenial (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-powerpc-smp-lts-xenial (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-powerpc-e500mc-lts-xenial (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-lowlatency-lts-xenial (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-generic-lts-xenial (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-generic-lpae-lts-xenial (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-4.4.0-201-powerpc64-smp (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-4.4.0-201-powerpc64-emb (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-4.4.0-201-powerpc-smp (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-4.4.0-201-powerpc-e500mc (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-4.4.0-201-lowlatency (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-4.4.0-201-generic-lpae (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-4.4.0-201-generic (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-virtual (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-powerpc64-smp (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-powerpc64-emb (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-powerpc-smp (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-powerpc-e500mc (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-lowlatency (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-generic-lpae (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-generic (Ubuntu package) Operating systems & Components / Operating system package or component |
Vendor | Canonical Ltd. |
Security Bulletin
This security bulletin contains information about 5 vulnerabilities.
EUVDB-ID: #VU13853
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2018-13093
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to cause DoS condition on the target system.
The vulnerability exists in the lookup_slow() function in the Extended File System (XFS) component, as defined in the source code file fs/xfs/xfs_icache.c due to boundary error when mounting XFS filesystems. A local attacker can mount an XFS filesystem that submits malicious input, trigger NULL pointer dereference memory error and cause the affected software to terminate abnormally.
MitigationUpdate the affected package linux to the latest version.
Vulnerable software versionsUbuntu: 14.04 - 16.04
linux-image-virtual-lts-xenial (Ubuntu package): before 4.4.0.201.176
linux-image-powerpc64-smp-lts-xenial (Ubuntu package): before 4.4.0.201.176
linux-image-powerpc64-emb-lts-xenial (Ubuntu package): before 4.4.0.201.176
linux-image-powerpc-smp-lts-xenial (Ubuntu package): before 4.4.0.201.176
linux-image-powerpc-e500mc-lts-xenial (Ubuntu package): before 4.4.0.201.176
linux-image-lowlatency-lts-xenial (Ubuntu package): before 4.4.0.201.176
linux-image-generic-lts-xenial (Ubuntu package): before 4.4.0.201.176
linux-image-generic-lpae-lts-xenial (Ubuntu package): before 4.4.0.201.176
linux-image-4.4.0-201-powerpc64-smp (Ubuntu package): before 4.4.0-201.233~14.04.1
linux-image-4.4.0-201-powerpc64-emb (Ubuntu package): before 4.4.0-201.233~14.04.1
linux-image-4.4.0-201-powerpc-smp (Ubuntu package): before 4.4.0-201.233~14.04.1
linux-image-4.4.0-201-powerpc-e500mc (Ubuntu package): before 4.4.0-201.233~14.04.1
linux-image-4.4.0-201-lowlatency (Ubuntu package): before 4.4.0-201.233~14.04.1
linux-image-4.4.0-201-generic-lpae (Ubuntu package): before 4.4.0-201.233~14.04.1
linux-image-4.4.0-201-generic (Ubuntu package): before 4.4.0-201.233~14.04.1
linux-image-virtual (Ubuntu package): before 4.4.0.201.207
linux-image-powerpc64-smp (Ubuntu package): before 4.4.0.201.207
linux-image-powerpc64-emb (Ubuntu package): before 4.4.0.201.207
linux-image-powerpc-smp (Ubuntu package): before 4.4.0.201.207
linux-image-powerpc-e500mc (Ubuntu package): before 4.4.0.201.207
linux-image-lowlatency (Ubuntu package): before 4.4.0.201.207
linux-image-generic-lpae (Ubuntu package): before 4.4.0.201.207
linux-image-generic (Ubuntu package): before 4.4.0.201.207
CPE2.3https://ubuntu.com/security/notices/USN-4708-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU34962
Risk: Medium
CVSSv4.0: 4.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2019-19813
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
In the Linux kernel 5.0.21, mounting a crafted btrfs filesystem image, performing some operations, and then making a syncfs system call can lead to a use-after-free in __mutex_lock in kernel/locking/mutex.c. This is related to mutex_can_spin_on_owner in kernel/locking/mutex.c, __btrfs_qgroup_free_meta in fs/btrfs/qgroup.c, and btrfs_insert_delayed_items in fs/btrfs/delayed-inode.c.
MitigationUpdate the affected package linux to the latest version.
Vulnerable software versionsUbuntu: 14.04 - 16.04
linux-image-virtual-lts-xenial (Ubuntu package): before 4.4.0.201.176
linux-image-powerpc64-smp-lts-xenial (Ubuntu package): before 4.4.0.201.176
linux-image-powerpc64-emb-lts-xenial (Ubuntu package): before 4.4.0.201.176
linux-image-powerpc-smp-lts-xenial (Ubuntu package): before 4.4.0.201.176
linux-image-powerpc-e500mc-lts-xenial (Ubuntu package): before 4.4.0.201.176
linux-image-lowlatency-lts-xenial (Ubuntu package): before 4.4.0.201.176
linux-image-generic-lts-xenial (Ubuntu package): before 4.4.0.201.176
linux-image-generic-lpae-lts-xenial (Ubuntu package): before 4.4.0.201.176
linux-image-4.4.0-201-powerpc64-smp (Ubuntu package): before 4.4.0-201.233~14.04.1
linux-image-4.4.0-201-powerpc64-emb (Ubuntu package): before 4.4.0-201.233~14.04.1
linux-image-4.4.0-201-powerpc-smp (Ubuntu package): before 4.4.0-201.233~14.04.1
linux-image-4.4.0-201-powerpc-e500mc (Ubuntu package): before 4.4.0-201.233~14.04.1
linux-image-4.4.0-201-lowlatency (Ubuntu package): before 4.4.0-201.233~14.04.1
linux-image-4.4.0-201-generic-lpae (Ubuntu package): before 4.4.0-201.233~14.04.1
linux-image-4.4.0-201-generic (Ubuntu package): before 4.4.0-201.233~14.04.1
linux-image-virtual (Ubuntu package): before 4.4.0.201.207
linux-image-powerpc64-smp (Ubuntu package): before 4.4.0.201.207
linux-image-powerpc64-emb (Ubuntu package): before 4.4.0.201.207
linux-image-powerpc-smp (Ubuntu package): before 4.4.0.201.207
linux-image-powerpc-e500mc (Ubuntu package): before 4.4.0.201.207
linux-image-lowlatency (Ubuntu package): before 4.4.0.201.207
linux-image-generic-lpae (Ubuntu package): before 4.4.0.201.207
linux-image-generic (Ubuntu package): before 4.4.0.201.207
CPE2.3https://ubuntu.com/security/notices/USN-4708-1
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU34964
Risk: High
CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2019-19816
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
In the Linux kernel 5.0.21, mounting a crafted btrfs filesystem image and performing some operations can cause slab-out-of-bounds write access in __btrfs_map_block in fs/btrfs/volumes.c, because a value of 1 for the number of data stripes is mishandled.
MitigationUpdate the affected package linux to the latest version.
Vulnerable software versionsUbuntu: 14.04 - 16.04
linux-image-virtual-lts-xenial (Ubuntu package): before 4.4.0.201.176
linux-image-powerpc64-smp-lts-xenial (Ubuntu package): before 4.4.0.201.176
linux-image-powerpc64-emb-lts-xenial (Ubuntu package): before 4.4.0.201.176
linux-image-powerpc-smp-lts-xenial (Ubuntu package): before 4.4.0.201.176
linux-image-powerpc-e500mc-lts-xenial (Ubuntu package): before 4.4.0.201.176
linux-image-lowlatency-lts-xenial (Ubuntu package): before 4.4.0.201.176
linux-image-generic-lts-xenial (Ubuntu package): before 4.4.0.201.176
linux-image-generic-lpae-lts-xenial (Ubuntu package): before 4.4.0.201.176
linux-image-4.4.0-201-powerpc64-smp (Ubuntu package): before 4.4.0-201.233~14.04.1
linux-image-4.4.0-201-powerpc64-emb (Ubuntu package): before 4.4.0-201.233~14.04.1
linux-image-4.4.0-201-powerpc-smp (Ubuntu package): before 4.4.0-201.233~14.04.1
linux-image-4.4.0-201-powerpc-e500mc (Ubuntu package): before 4.4.0-201.233~14.04.1
linux-image-4.4.0-201-lowlatency (Ubuntu package): before 4.4.0-201.233~14.04.1
linux-image-4.4.0-201-generic-lpae (Ubuntu package): before 4.4.0-201.233~14.04.1
linux-image-4.4.0-201-generic (Ubuntu package): before 4.4.0-201.233~14.04.1
linux-image-virtual (Ubuntu package): before 4.4.0.201.207
linux-image-powerpc64-smp (Ubuntu package): before 4.4.0.201.207
linux-image-powerpc64-emb (Ubuntu package): before 4.4.0.201.207
linux-image-powerpc-smp (Ubuntu package): before 4.4.0.201.207
linux-image-powerpc-e500mc (Ubuntu package): before 4.4.0.201.207
linux-image-lowlatency (Ubuntu package): before 4.4.0.201.207
linux-image-generic-lpae (Ubuntu package): before 4.4.0.201.207
linux-image-generic (Ubuntu package): before 4.4.0.201.207
CPE2.3https://ubuntu.com/security/notices/USN-4708-1
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92762
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2020-25669
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
A vulnerability was found in the Linux Kernel where the function sunkbd_reinit having been scheduled by sunkbd_interrupt before sunkbd being freed. Though the dangling pointer is set to NULL in sunkbd_disconnect, there is still an alias in sunkbd_reinit causing Use After Free.
MitigationUpdate the affected package linux to the latest version.
Vulnerable software versionsUbuntu: 14.04 - 16.04
linux-image-virtual-lts-xenial (Ubuntu package): before 4.4.0.201.176
linux-image-powerpc64-smp-lts-xenial (Ubuntu package): before 4.4.0.201.176
linux-image-powerpc64-emb-lts-xenial (Ubuntu package): before 4.4.0.201.176
linux-image-powerpc-smp-lts-xenial (Ubuntu package): before 4.4.0.201.176
linux-image-powerpc-e500mc-lts-xenial (Ubuntu package): before 4.4.0.201.176
linux-image-lowlatency-lts-xenial (Ubuntu package): before 4.4.0.201.176
linux-image-generic-lts-xenial (Ubuntu package): before 4.4.0.201.176
linux-image-generic-lpae-lts-xenial (Ubuntu package): before 4.4.0.201.176
linux-image-4.4.0-201-powerpc64-smp (Ubuntu package): before 4.4.0-201.233~14.04.1
linux-image-4.4.0-201-powerpc64-emb (Ubuntu package): before 4.4.0-201.233~14.04.1
linux-image-4.4.0-201-powerpc-smp (Ubuntu package): before 4.4.0-201.233~14.04.1
linux-image-4.4.0-201-powerpc-e500mc (Ubuntu package): before 4.4.0-201.233~14.04.1
linux-image-4.4.0-201-lowlatency (Ubuntu package): before 4.4.0-201.233~14.04.1
linux-image-4.4.0-201-generic-lpae (Ubuntu package): before 4.4.0-201.233~14.04.1
linux-image-4.4.0-201-generic (Ubuntu package): before 4.4.0-201.233~14.04.1
linux-image-virtual (Ubuntu package): before 4.4.0.201.207
linux-image-powerpc64-smp (Ubuntu package): before 4.4.0.201.207
linux-image-powerpc64-emb (Ubuntu package): before 4.4.0.201.207
linux-image-powerpc-smp (Ubuntu package): before 4.4.0.201.207
linux-image-powerpc-e500mc (Ubuntu package): before 4.4.0.201.207
linux-image-lowlatency (Ubuntu package): before 4.4.0.201.207
linux-image-generic-lpae (Ubuntu package): before 4.4.0.201.207
linux-image-generic (Ubuntu package): before 4.4.0.201.207
CPE2.3https://ubuntu.com/security/notices/USN-4708-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU56242
Risk: Low
CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2020-27777
CWE-ID:
CWE-862 - Missing Authorization
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to the way RTAS handles memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like user could use this flaw to further increase their privileges to that of a running kernel.
MitigationUpdate the affected package linux to the latest version.
Vulnerable software versionsUbuntu: 14.04 - 16.04
linux-image-virtual-lts-xenial (Ubuntu package): before 4.4.0.201.176
linux-image-powerpc64-smp-lts-xenial (Ubuntu package): before 4.4.0.201.176
linux-image-powerpc64-emb-lts-xenial (Ubuntu package): before 4.4.0.201.176
linux-image-powerpc-smp-lts-xenial (Ubuntu package): before 4.4.0.201.176
linux-image-powerpc-e500mc-lts-xenial (Ubuntu package): before 4.4.0.201.176
linux-image-lowlatency-lts-xenial (Ubuntu package): before 4.4.0.201.176
linux-image-generic-lts-xenial (Ubuntu package): before 4.4.0.201.176
linux-image-generic-lpae-lts-xenial (Ubuntu package): before 4.4.0.201.176
linux-image-4.4.0-201-powerpc64-smp (Ubuntu package): before 4.4.0-201.233~14.04.1
linux-image-4.4.0-201-powerpc64-emb (Ubuntu package): before 4.4.0-201.233~14.04.1
linux-image-4.4.0-201-powerpc-smp (Ubuntu package): before 4.4.0-201.233~14.04.1
linux-image-4.4.0-201-powerpc-e500mc (Ubuntu package): before 4.4.0-201.233~14.04.1
linux-image-4.4.0-201-lowlatency (Ubuntu package): before 4.4.0-201.233~14.04.1
linux-image-4.4.0-201-generic-lpae (Ubuntu package): before 4.4.0-201.233~14.04.1
linux-image-4.4.0-201-generic (Ubuntu package): before 4.4.0-201.233~14.04.1
linux-image-virtual (Ubuntu package): before 4.4.0.201.207
linux-image-powerpc64-smp (Ubuntu package): before 4.4.0.201.207
linux-image-powerpc64-emb (Ubuntu package): before 4.4.0.201.207
linux-image-powerpc-smp (Ubuntu package): before 4.4.0.201.207
linux-image-powerpc-e500mc (Ubuntu package): before 4.4.0.201.207
linux-image-lowlatency (Ubuntu package): before 4.4.0.201.207
linux-image-generic-lpae (Ubuntu package): before 4.4.0.201.207
linux-image-generic (Ubuntu package): before 4.4.0.201.207
CPE2.3https://ubuntu.com/security/notices/USN-4708-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.