Tristan Madani discovered that the file locking implementation in the Linux kernel contained a race condition. A local attacker could possibly use this to cause a denial of service or expose sensitive information. (CVE-2019-19769)
It was discovered that the Serial CAN interface driver in the Linux kernel did not properly initialize data. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2020-11494)
It was discovered that the linux kernel did not properly validate certain mount options to the tmpfs virtual memory file system. A local attacker with the ability to specify mount options could use this to cause a denial of service (system crash). (CVE-2020-11565)
It was discovered that the OV51x USB Camera device driver in the Linux kernel did not properly validate device metadata. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2020-11608)
It was discovered that the STV06XX USB Camera device driver in the Linux kernel did not properly validate device metadata. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2020-11609)
It was discovered that the Xirlink C-It USB Camera device driver in the Linux kernel did not properly validate device metadata. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2020-11668)
David Gibson discovered that the Linux kernel on Power9 CPUs did not properly save and restore Authority Mask registers state in some situations. A local attacker in a guest VM could use this to cause a denial of service (host system crash). (CVE-2020-11669)
It was discovered that the block layer in the Linux kernel contained a race condition leading to a use-after-free vulnerability. A local attacker could possibly use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2020-12657)
{ "binaries": [ { "binary_version": "5.0.0-1037.38", "binary_name": "linux-buildinfo-5.0.0-1037-gke" }, { "binary_version": "5.0.0-1037.38", "binary_name": "linux-gke-5.0-headers-5.0.0-1037" }, { "binary_version": "5.0.0-1037.38", "binary_name": "linux-gke-5.0-tools-5.0.0-1037" }, { "binary_version": "5.0.0-1037.38", "binary_name": "linux-headers-5.0.0-1037-gke" }, { "binary_version": "5.0.0-1037.38", "binary_name": "linux-image-unsigned-5.0.0-1037-gke" }, { "binary_version": "5.0.0-1037.38", "binary_name": "linux-modules-5.0.0-1037-gke" }, { "binary_version": "5.0.0-1037.38", "binary_name": "linux-modules-extra-5.0.0-1037-gke" }, { "binary_version": "5.0.0-1037.38", "binary_name": "linux-tools-5.0.0-1037-gke" } ], "availability": "No subscription required" }
{ "cves_map": { "ecosystem": "Ubuntu:18.04:LTS", "cves": [ { "id": "CVE-2019-19769", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" }, { "type": "Ubuntu", "score": "medium" } ] }, { "id": "CVE-2020-11494", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" }, { "type": "Ubuntu", "score": "medium" } ] }, { "id": "CVE-2020-11565", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" }, { "type": "Ubuntu", "score": "medium" } ] }, { "id": "CVE-2020-11608", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "type": "Ubuntu", "score": "medium" } ] }, { "id": "CVE-2020-11609", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "type": "Ubuntu", "score": "medium" } ] }, { "id": "CVE-2020-11668", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" }, { "type": "Ubuntu", "score": "medium" } ] }, { "id": "CVE-2020-11669", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "type": "Ubuntu", "score": "medium" } ] }, { "id": "CVE-2020-12657", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "type": "Ubuntu", "score": "medium" } ] } ] } }
{ "binaries": [ { "binary_version": "5.0.0-1052.57", "binary_name": "block-modules-5.0.0-1052-oem-osp1-di" }, { "binary_version": "5.0.0-1052.57", "binary_name": "crypto-modules-5.0.0-1052-oem-osp1-di" }, { "binary_version": "5.0.0-1052.57", "binary_name": "fat-modules-5.0.0-1052-oem-osp1-di" }, { "binary_version": "5.0.0-1052.57", "binary_name": "fb-modules-5.0.0-1052-oem-osp1-di" }, { "binary_version": "5.0.0-1052.57", "binary_name": "firewire-core-modules-5.0.0-1052-oem-osp1-di" }, { "binary_version": "5.0.0-1052.57", "binary_name": "floppy-modules-5.0.0-1052-oem-osp1-di" }, { "binary_version": "5.0.0-1052.57", "binary_name": "fs-core-modules-5.0.0-1052-oem-osp1-di" }, { "binary_version": "5.0.0-1052.57", "binary_name": "fs-secondary-modules-5.0.0-1052-oem-osp1-di" }, { "binary_version": "5.0.0-1052.57", "binary_name": "input-modules-5.0.0-1052-oem-osp1-di" }, { "binary_version": "5.0.0-1052.57", "binary_name": "ipmi-modules-5.0.0-1052-oem-osp1-di" }, { "binary_version": "5.0.0-1052.57", "binary_name": "kernel-image-5.0.0-1052-oem-osp1-di" }, { "binary_version": "5.0.0-1052.57", "binary_name": "linux-buildinfo-5.0.0-1052-oem-osp1" }, { "binary_version": "5.0.0-1052.57", "binary_name": "linux-headers-5.0.0-1052-oem-osp1" }, { "binary_version": "5.0.0-1052.57", "binary_name": "linux-image-unsigned-5.0.0-1052-oem-osp1" }, { "binary_version": "5.0.0-1052.57", "binary_name": "linux-modules-5.0.0-1052-oem-osp1" }, { "binary_version": "5.0.0-1052.57", "binary_name": "linux-oem-osp1-headers-5.0.0-1052" }, { "binary_version": "5.0.0-1052.57", "binary_name": "linux-oem-osp1-tools-5.0.0-1052" }, { "binary_version": "5.0.0-1052.57", "binary_name": "linux-oem-osp1-tools-host" }, { "binary_version": "5.0.0-1052.57", "binary_name": "linux-tools-5.0.0-1052-oem-osp1" }, { "binary_version": "5.0.0-1052.57", "binary_name": "linux-udebs-oem-osp1" }, { "binary_version": "5.0.0-1052.57", "binary_name": "md-modules-5.0.0-1052-oem-osp1-di" }, { "binary_version": "5.0.0-1052.57", "binary_name": "message-modules-5.0.0-1052-oem-osp1-di" }, { "binary_version": "5.0.0-1052.57", "binary_name": "mouse-modules-5.0.0-1052-oem-osp1-di" }, { "binary_version": "5.0.0-1052.57", "binary_name": "multipath-modules-5.0.0-1052-oem-osp1-di" }, { "binary_version": "5.0.0-1052.57", "binary_name": "nfs-modules-5.0.0-1052-oem-osp1-di" }, { "binary_version": "5.0.0-1052.57", "binary_name": "nic-modules-5.0.0-1052-oem-osp1-di" }, { "binary_version": "5.0.0-1052.57", "binary_name": "nic-pcmcia-modules-5.0.0-1052-oem-osp1-di" }, { "binary_version": "5.0.0-1052.57", "binary_name": "nic-shared-modules-5.0.0-1052-oem-osp1-di" }, { "binary_version": "5.0.0-1052.57", "binary_name": "nic-usb-modules-5.0.0-1052-oem-osp1-di" }, { "binary_version": "5.0.0-1052.57", "binary_name": "parport-modules-5.0.0-1052-oem-osp1-di" }, { "binary_version": "5.0.0-1052.57", "binary_name": "pata-modules-5.0.0-1052-oem-osp1-di" }, { "binary_version": "5.0.0-1052.57", "binary_name": "pcmcia-modules-5.0.0-1052-oem-osp1-di" }, { "binary_version": "5.0.0-1052.57", "binary_name": "pcmcia-storage-modules-5.0.0-1052-oem-osp1-di" }, { "binary_version": "5.0.0-1052.57", "binary_name": "plip-modules-5.0.0-1052-oem-osp1-di" }, { "binary_version": "5.0.0-1052.57", "binary_name": "ppp-modules-5.0.0-1052-oem-osp1-di" }, { "binary_version": "5.0.0-1052.57", "binary_name": "sata-modules-5.0.0-1052-oem-osp1-di" }, { "binary_version": "5.0.0-1052.57", "binary_name": "scsi-modules-5.0.0-1052-oem-osp1-di" }, { "binary_version": "5.0.0-1052.57", "binary_name": "serial-modules-5.0.0-1052-oem-osp1-di" }, { "binary_version": "5.0.0-1052.57", "binary_name": "storage-core-modules-5.0.0-1052-oem-osp1-di" }, { "binary_version": "5.0.0-1052.57", "binary_name": "usb-modules-5.0.0-1052-oem-osp1-di" }, { "binary_version": "5.0.0-1052.57", "binary_name": "virtio-modules-5.0.0-1052-oem-osp1-di" }, { "binary_version": "5.0.0-1052.57", "binary_name": "vlan-modules-5.0.0-1052-oem-osp1-di" } ], "availability": "No subscription required" }
{ "cves_map": { "ecosystem": "Ubuntu:18.04:LTS", "cves": [ { "id": "CVE-2019-19769", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" }, { "type": "Ubuntu", "score": "medium" } ] }, { "id": "CVE-2020-11494", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" }, { "type": "Ubuntu", "score": "medium" } ] }, { "id": "CVE-2020-11565", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" }, { "type": "Ubuntu", "score": "medium" } ] }, { "id": "CVE-2020-11608", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "type": "Ubuntu", "score": "medium" } ] }, { "id": "CVE-2020-11609", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "type": "Ubuntu", "score": "medium" } ] }, { "id": "CVE-2020-11668", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" }, { "type": "Ubuntu", "score": "medium" } ] }, { "id": "CVE-2020-11669", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "type": "Ubuntu", "score": "medium" } ] }, { "id": "CVE-2020-12657", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "type": "Ubuntu", "score": "medium" } ] } ] } }