First published: Tue Aug 13 2019(Updated: )
Eli Biham and Lior Neumann discovered that the Bluetooth implementation in the Linux kernel did not properly validate elliptic curve parameters during Diffie-Hellman key exchange in some situations. An attacker could use this to expose sensitive information. (CVE-2018-5383) It was discovered that a heap buffer overflow existed in the Marvell Wireless LAN device driver for the Linux kernel. An attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-10126) Andrei Vlad Lutas and Dan Lutas discovered that some x86 processors incorrectly handle SWAPGS instructions during speculative execution. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2019-1125) Jann Horn discovered that a race condition existed in the Linux kernel when performing core dumps. A local attacker could use this to cause a denial of service (system crash) or expose sensitive information. (CVE-2019-11599) It was discovered that the PowerPC dlpar implementation in the Linux kernel did not properly check for allocation errors in some situations. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2019-12614) Jann Horn discovered that the ptrace implementation in the Linux kernel did not properly record credentials in some situations. A local attacker could use this to cause a denial of service (system crash) or possibly gain administrative privileges. (CVE-2019-13272) It was discovered that the Marvell Wireless LAN device driver in the Linux kernel did not properly validate the BSS descriptor. A local attacker could possibly use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-3846)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-4.4.0-1054-kvm | <4.4.0-1054.61 | 4.4.0-1054.61 |
Ubuntu OpenSSH Client | =16.04 | |
All of | ||
ubuntu/linux-image-4.4.0-1090-aws | <4.4.0-1090.101 | 4.4.0-1090.101 |
Ubuntu OpenSSH Client | =16.04 | |
All of | ||
ubuntu/linux-image-4.4.0-1118-raspi2 | <4.4.0-1118.127 | 4.4.0-1118.127 |
Ubuntu OpenSSH Client | =16.04 | |
All of | ||
ubuntu/linux-image-4.4.0-1122-snapdragon | <4.4.0-1122.128 | 4.4.0-1122.128 |
Ubuntu OpenSSH Client | =16.04 | |
All of | ||
ubuntu/linux-image-4.4.0-159-generic | <4.4.0-159.187 | 4.4.0-159.187 |
Ubuntu OpenSSH Client | =16.04 | |
All of | ||
ubuntu/linux-image-4.4.0-159-generic-lpae | <4.4.0-159.187 | 4.4.0-159.187 |
Ubuntu OpenSSH Client | =16.04 | |
All of | ||
ubuntu/linux-image-4.4.0-159-lowlatency | <4.4.0-159.187 | 4.4.0-159.187 |
Ubuntu OpenSSH Client | =16.04 | |
All of | ||
ubuntu/linux-image-4.4.0-159-powerpc-e500mc | <4.4.0-159.187 | 4.4.0-159.187 |
Ubuntu OpenSSH Client | =16.04 | |
All of | ||
ubuntu/linux-image-4.4.0-159-powerpc-smp | <4.4.0-159.187 | 4.4.0-159.187 |
Ubuntu OpenSSH Client | =16.04 | |
All of | ||
ubuntu/linux-image-4.4.0-159-powerpc64-emb | <4.4.0-159.187 | 4.4.0-159.187 |
Ubuntu OpenSSH Client | =16.04 | |
All of | ||
ubuntu/linux-image-4.4.0-159-powerpc64-smp | <4.4.0-159.187 | 4.4.0-159.187 |
Ubuntu OpenSSH Client | =16.04 | |
All of | ||
ubuntu/linux-image-aws | <4.4.0.1090.94 | 4.4.0.1090.94 |
Ubuntu OpenSSH Client | =16.04 | |
All of | ||
ubuntu/linux-image-generic | <4.4.0.159.167 | 4.4.0.159.167 |
Ubuntu OpenSSH Client | =16.04 | |
All of | ||
ubuntu/linux-image-generic-lpae | <4.4.0.159.167 | 4.4.0.159.167 |
Ubuntu OpenSSH Client | =16.04 | |
All of | ||
ubuntu/linux-image-kvm | <4.4.0.1054.54 | 4.4.0.1054.54 |
Ubuntu OpenSSH Client | =16.04 | |
All of | ||
ubuntu/linux-image-lowlatency | <4.4.0.159.167 | 4.4.0.159.167 |
Ubuntu OpenSSH Client | =16.04 | |
All of | ||
ubuntu/linux-image-powerpc-e500mc | <4.4.0.159.167 | 4.4.0.159.167 |
Ubuntu OpenSSH Client | =16.04 | |
All of | ||
ubuntu/linux-image-powerpc-smp | <4.4.0.159.167 | 4.4.0.159.167 |
Ubuntu OpenSSH Client | =16.04 | |
All of | ||
ubuntu/linux-image-powerpc64-emb | <4.4.0.159.167 | 4.4.0.159.167 |
Ubuntu OpenSSH Client | =16.04 | |
All of | ||
ubuntu/linux-image-powerpc64-smp | <4.4.0.159.167 | 4.4.0.159.167 |
Ubuntu OpenSSH Client | =16.04 | |
All of | ||
ubuntu/linux-image-raspi2 | <4.4.0.1118.118 | 4.4.0.1118.118 |
Ubuntu OpenSSH Client | =16.04 | |
All of | ||
ubuntu/linux-image-snapdragon | <4.4.0.1122.114 | 4.4.0.1122.114 |
Ubuntu OpenSSH Client | =16.04 | |
All of | ||
ubuntu/linux-image-virtual | <4.4.0.159.167 | 4.4.0.159.167 |
Ubuntu OpenSSH Client | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
USN-4095-1 addresses the Linux kernel vulnerabilities.
The severity of CVE-2018-5383 is not specified.
CVE-2018-5383 can allow an attacker to expose sensitive information by exploiting a validation issue in the Bluetooth implementation in the Linux kernel during Diffie-Hellman key exchange.
To fix the vulnerabilities addressed by USN-4095-1, update your Ubuntu 16.04 system to the specified kernel versions.
You can find more information about the vulnerabilities addressed by USN-4095-1 on the Ubuntu website.