Executive Summary
Summary | |
---|---|
Title | Linux kernel regression |
Informations | |||
---|---|---|---|
Name | USN-4115-2 | First vendor Publication | 2019-09-11 |
Vendor | Ubuntu | Last vendor Modification | 2019-09-11 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 10 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 18.04 LTS - Ubuntu 16.04 LTS Summary: USN 4115-1 introduced a regression in the Linux kernel. Software Description: - linux: Linux kernel - linux-aws: Linux kernel for Amazon Web Services (AWS) systems - linux-gke-4.15: Linux kernel for Google Container Engine (GKE) systems - linux-kvm: Linux kernel for cloud environments - linux-oracle: Linux kernel for Oracle Cloud systems - linux-raspi2: Linux kernel for Raspberry Pi 2 - linux-aws-hwe: Linux kernel for Amazon Web Services (AWS-HWE) systems - linux-azure: Linux kernel for Microsoft Azure Cloud systems - linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems - linux-hwe: Linux hardware enablement (HWE) kernel Details: USN 4115-1 fixed vulnerabilities in the Linux 4.15 kernel for Ubuntu 18.04 LTS and Ubuntu 16.04 LTS. Unfortunately, as part of the update, a regression was introduced that caused a kernel crash when handling fragmented packets in some situations. This update addresses the issue. We apologize for the inconvenience. Original advisory details: Hui Peng and Mathias Payer discovered that the Option USB High Speed driver Zhipeng Xie discovered that an infinite loop could triggered in the CFS It was discovered that the Intel Wi-Fi device driver in the Linux kernel did It was discovered that the Bluetooth UART implementation in the Linux Amit Klein and Benny Pinkas discovered that the Linux kernel did not Amit Klein and Benny Pinkas discovered that the location of kernel It was discovered that an integer overflow existed in the Linux kernel when Jann Horn discovered that a race condition existed in the Linux kernel when It was discovered that a null pointer dereference vulnerability existed in It was discovered that the GTCO tablet input driver in the Linux kernel did Praveen Pandey discovered that the Linux kernel did not properly validate It was discovered that the floppy driver in the Linux kernel did not It was discovered that the floppy driver in the Linux kernel did not Tuba Yavuz discovered that a race condition existed in the DesignWare USB3 It was discovered that an out-of-bounds read existed in the QLogic QEDI It was discovered that the Raremono AM/FM/SW radio device driver in the It was discovered at a double-free error existed in the USB Rio 500 device It was discovered that a race condition existed in the Advanced Linux Sound It was discovered that a race condition existed in the CPiA2 video4linux It was discovered that a race condition existed in the Softmac USB Prism54 It was discovered that a use-after-free vulnerability existed in the Jason Wang discovered that an infinite loop vulnerability existed in the Daniele Antonioli, Nils Ole Tippenhauer, and Kasper B. Rasmussen discovered It was discovered that a race condition existed in the USB YUREX device It was discovered that the Siano USB MDTV receiver device driver in the It was discovered that the Line 6 POD USB device driver in the Linux kernel Muyu Yu discovered that the CAN implementation in the Linux kernel in some Vladis Dronov discovered that the debug interface for the Linux kernel's Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 18.04 LTS: Ubuntu 16.04 LTS: After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References: Package Information: |
Original Source
Url : http://www.ubuntu.com/usn/USN-4115-2 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
28 % | CWE-416 | Use After Free |
16 % | CWE-476 | NULL Pointer Dereference |
12 % | CWE-125 | Out-of-bounds Read |
8 % | CWE-787 | Out-of-bounds Write (CWE/SANS Top 25) |
8 % | CWE-667 | Insufficient Locking |
8 % | CWE-326 | Inadequate Encryption Strength |
4 % | CWE-415 | Double Free |
4 % | CWE-399 | Resource Management Errors |
4 % | CWE-369 | Divide By Zero |
4 % | CWE-327 | Use of a Broken or Risky Cryptographic Algorithm (CWE/SANS Top 25) |
4 % | CWE-190 | Integer Overflow or Wraparound (CWE/SANS Top 25) |
CPE : Common Platform Enumeration
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2019-01-15 | Name : The remote Fedora host is missing one or more security updates. File : fedora_2019-337484d88b.nasl - Type : ACT_GATHER_INFO |
2019-01-15 | Name : The remote Fedora host is missing one or more security updates. File : fedora_2019-b0f7a7b74b.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2019-09-11 09:18:47 |
|