Ubuntu 4527-1: Linux kernel vulnerabilities>

Ubuntu 4527-1: Linux kernel vulnerabilities>
Several security issues were fixed in the Linux kernel.
==========================================================================
Ubuntu Security Notice USN-4527-1
September 22, 2020 linux, linux-aws, linux-lts-xenial, linux-raspi2, linux-snapdragon
vulnerabilities
========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 16.04 LTS
- Ubuntu 14.04 ESM Summary: Several security issues were fixed in the Linux kernel. Software Description:
- linux: Linux kernel
- linux-aws: Linux kernel for Amazon Web Services (AWS) systems
- linux-raspi2: Linux kernel for Raspberry Pi (V8) systems
- linux-snapdragon: Linux kernel for Qualcomm Snapdragon processors
- linux-lts-xenial: Linux hardware enablement kernel from Xenial for Trusty Details: It was discovered that the Conexant 23885 TV card device driver for the
Linux kernel did not properly deallocate memory in some error conditions. A
local attacker could use this to cause a denial of service (memory
exhaustion). (CVE-2019-19054) It was discovered that the Atheros HTC based wireless driver in the Linux
kernel did not properly deallocate in certain error conditions. A local
attacker could use this to cause a denial of service (memory exhaustion).
(CVE-2019-19073, CVE-2019-19074) Yue Haibing discovered that the Linux kernel did not properly handle
reference counting in sysfs for network devices in some situations. A local
attacker could possibly use this to cause a denial of service.
(CVE-2019-20811) It was discovered that the F2FS file system in the Linux kernel did not
properly perform bounds checking in some situations, leading to an out-of-
bounds read. A local attacker could possibly use this to expose sensitive
information (kernel memory). (CVE-2019-9445) It was discovered that the F2FS file system in the Linux kernel did not
properly validate xattr meta data in some situations, leading to an out-of-
bounds read. An attacker could use this to construct a malicious F2FS image
that, when mounted, could expose sensitive information (kernel memory).
( ..

Support the originator by clicking the read the rest link below.