Professional OVAL Repository
[Eng]
[Rus]
[Sign-In]
OVAL
Search
Categories
RedCheck
About
OVAL Definitions
OVAL Items
FSTEC Data Bank Information Security Threats
NKCKI
EOL (End Of Life)
Linux Security Advisories
Mozilla Foundation Security Advisory
IBM
VMware
Cisco
Check Point Software Technologies
Apache
Solaris
FreeBSD
Development
GitHub Enterprise
Google Chrome Security Advisories
Oracle Security Advisories
Adobe Security Advisories
OpenSSL Security Advisories
Microsoft
CVE
CWE
CPE
Latest Updates
OS ROSA
ALT Linux
Astra Linux SE 1.5
Astra Linux SE 1.6
RED OS
DSA (Debian Security Advisory) Patсh Statistics
DSA (Debian Security Advisory) Patсh Feed
DSA (Debian Security Advisory) Vulnerability Feed
DLA (Debian Security Advisory) Patсh Statistics
DLA (Debian Security Advisory) Patсh Feed
DLA (Debian Security Advisory) Vulnerability Feed
ALT Linux (Security Bulletins) Patсh Statistics
ALT Linux (Security Bulletins) Patсh Feed
ALT Linux (Security Bulletins) Vulnerability Feed
RED OS (Security Bulletins) Patсh Statistics
RED OS (Security Bulletins) Patсh Feed
RED OS (Security Bulletins) Vulnerability Feed
USN (Ubuntu Security Notice) Patсh Statistics
USN (Ubuntu Security Notice) Patсh Feed
USN (Ubuntu Security Notice) Vulnerability Feed
RHSA (RedHat Security Advisory) Patсh Statistics
RHSA (RedHat Security Advisory) Patсh Feed
RHSA (RedHat Security Advisory) Vulnerability Feed
ELSA (Oracle Linux Security Advisory) Patсh Statistics
ELSA (Oracle Linux Security Advisory) Patсh Feed
ELSA (Oracle Linux Security Advisory) Vulnerability Feed
SUSE (SUSE Security Advisories) Patсh Statistics
SUSE (SUSE Security Advisories) Patсh Feed
SUSE (SUSE Security Advisories) Vulnerability Feed
openSUSE (openSUSE Security Advisories) Patсh Statistics
openSUSE (openSUSE Security Advisories) Patсh Feed
openSUSE (openSUSE Security Advisories) Vulnerability Feed
Amazon Linux AMI (Security Bulletins) Patсh Statistics
Amazon Linux AMI (Security Bulletins) Patсh Feed
Amazon Linux AMI (Security Bulletins) Vulnerability Feed
Mageia Linux (Security Bulletins) Patсh Statistics
Mageia Linux (Security Bulletins) Patсh Feed
Mageia Linux (Security Bulletins) Vulnerability Feed
OS ROSA SX COBALT 1.0
OS ROSA DX COBALT 1.0
ROSA 7.3 (Security Advisories) Patсh Statistics
ROSA 7.3 (Security Advisories) Patсh Feed
ROSA 7.3 (Security Advisories) Vulnerability Feed
ALT Linux SPT 6.0
ALT Linux SPT 7.0
ALT 8 SP
ALT 9
RED OS Murom 7.1
RED OS Murom 7.2
IBM DB2
VMware Vulnerabilities Advisory (VMSA)
VMware vCenter Patch Advisories
VMware ESXi Patch Advisories
VMware NSX Patches
VMware NSX Vulnerabilities
VMware Photon OS 1.0 Patches
VMware Photon OS 1.0 Vulnerabilities
VMware Photon OS 2.0 Patches
VMware Photon OS 2.0 Vulnerabilities
Cisco ASA
Cisco IOS/NX-OS Advisory
Cisco NX-OS Vulnerabilities
Check Point Gaia
Apache Tomcat Advisories
Apache Tomcat Server
Apache HTTP Server
Python
Node.js
RubyGems
Qt
Microsoft Security Bulletin
Microsoft Knowledge Base Article
Microsoft SharePoint
Microsoft SharePoint Foundation 2013
Microsoft SharePoint Server 2013
Microsoft SharePoint Server 2016
About OVALdb
User manual
Pricing
Contact us
OVAL Definitions
>
OVAL Definition Details
Id
oval:com.altx-soft.nix:def:125057
[Rus]
Version
2
Class
patch
ALTXid
313734
Language
English
Severity
Critical
Title
DLA-2068-1 -- linux security update
Description
Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service, or information leak.
Family
unix
Platform
Debian 8
Product
linux
Reference
VENDOR: DLA-2068-1
VENDOR: DLA-2068-1
Id:
DLA-2068-1
Reference:
https://lists.debian.org/debian-lts-announce/2020/debian-lts-announce-202001/msg00013.html
CVE: CVE-2019-2215
CVE: CVE-2019-2215
Id:
CVE-2019-2215
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2215
Comment
: A use-after-free in binder.c allows an elevation of privilege from an application to the Linux Kernel. No user interaction is required to exploit this vulnerability, however exploitation does require either the installation of a malicious local application or a separate vulnerability in a network facing application.Product: AndroidAndroid ID: A-141720095
CVSSv2 Score:
4.6
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:P/I:P/A:P
CVSSv3 Score:
7.8
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CWE:
416 (Use After Free)
References:
https://source.android.com/security/bulletin/2019-10-01 (CONFIRM)
20191018 CVE 2019-2215 Android Binder Use After Free (FULLDISC)
http://packetstormsecurity.com/files/154911/Android-Binder-Use-After-Free.html (MISC)
https://security.netapp.com/advisory/ntap-20191031-0005/ (CONFIRM)
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191030-01-binder-en (CONFIRM)
20191108 [slackware-security] Slackware 14.2 kernel (SSA:2019-311-01) (BUGTRAQ)
http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html (MISC)
USN-4186-1 (UBUNTU)
[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update (MLIST)
http://packetstormsecurity.com/files/156495/Android-Binder-Use-After-Free.html (MISC)
[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update (MLIST)
CVE: CVE-2019-10220
CVE: CVE-2019-10220
Id:
CVE-2019-10220
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10220
Comment
: Linux kernel CIFS implementation, version 4.9.0 is vulnerable to a relative paths injection in directory entry lists.
CVSSv2 Score:
9.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSSv3 Score:
8.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CWE:
22 (Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'))
References:
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10220 (CONFIRM)
https://security.netapp.com/advisory/ntap-20200103-0001/ (CONFIRM)
USN-4226-1 (UBUNTU)
[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update (MLIST)
[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update (MLIST)
CVE: CVE-2019-14895
CVE: CVE-2019-14895
Id:
CVE-2019-14895
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14895
Comment
: A heap-based buffer overflow was discovered in the Linux kernel, all versions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. The flaw could occur when the station attempts a connection negotiation during the handling of the remote devices country settings. This could allow the remote device to cause a denial of service (system crash) or possibly execute arbitrary code.
CVSSv2 Score:
7.5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSSv3 Score:
9.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE:
122 (Heap-based Buffer Overflow)
References:
https://www.openwall.com/lists/oss-security/2019/11/22/2 (MISC)
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14895 (CONFIRM)
openSUSE-SU-2019:2675 (SUSE)
USN-4228-1 (UBUNTU)
USN-4227-1 (UBUNTU)
USN-4225-1 (UBUNTU)
USN-4228-2 (UBUNTU)
USN-4226-1 (UBUNTU)
USN-4227-2 (UBUNTU)
http://packetstormsecurity.com/files/155879/Kernel-Live-Patch-Security-Notice-LSN-0061-1.html (MISC)
[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update (MLIST)
USN-4225-2 (UBUNTU)
http://packetstormsecurity.com/files/156185/Kernel-Live-Patch-Security-Notice-LSN-0062-1.html (MISC)
RHSA-2020:0328 (REDHAT)
RHSA-2020:0339 (REDHAT)
RHSA-2020:0375 (REDHAT)
RHSA-2020:0374 (REDHAT)
RHSA-2020:0543 (REDHAT)
RHSA-2020:0592 (REDHAT)
RHSA-2020:0609 (REDHAT)
[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update (MLIST)
RHSA-2020:0653 (REDHAT)
RHSA-2020:0661 (REDHAT)
RHSA-2020:0664 (REDHAT)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MN6MLCN7G7VFTSXSZYXKXEFCUMFBUAXQ/ (MISC)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D4ISVNIC44SOGXTUBCIZFSUNQJ5LRKNZ/ (MISC)
CVE: CVE-2019-14896
CVE: CVE-2019-14896
Id:
CVE-2019-14896
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14896
Comment
: A heap-based buffer overflow vulnerability was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP.
CVSSv2 Score:
10
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSSv3 Score:
9.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE:
122 (Heap-based Buffer Overflow)
References:
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14896 (CONFIRM)
https://security.netapp.com/advisory/ntap-20200103-0001/ (CONFIRM)
USN-4228-1 (UBUNTU)
USN-4227-1 (UBUNTU)
USN-4225-1 (UBUNTU)
USN-4228-2 (UBUNTU)
USN-4226-1 (UBUNTU)
USN-4227-2 (UBUNTU)
http://packetstormsecurity.com/files/155879/Kernel-Live-Patch-Security-Notice-LSN-0061-1.html (MISC)
[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update (MLIST)
USN-4225-2 (UBUNTU)
http://packetstormsecurity.com/files/156185/Kernel-Live-Patch-Security-Notice-LSN-0062-1.html (MISC)
[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update (MLIST)
openSUSE-SU-2020:0336 (SUSE)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MN6MLCN7G7VFTSXSZYXKXEFCUMFBUAXQ/ (MISC)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D4ISVNIC44SOGXTUBCIZFSUNQJ5LRKNZ/ (MISC)
CVE: CVE-2019-14897
CVE: CVE-2019-14897
Id:
CVE-2019-14897
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14897
Comment
: A stack-based buffer overflow was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. An attacker is able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA.
CVSSv2 Score:
7.5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSSv3 Score:
9.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE:
121 (Stack-based Buffer Overflow)
References:
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14897 (CONFIRM)
USN-4228-1 (UBUNTU)
USN-4225-1 (UBUNTU)
USN-4228-2 (UBUNTU)
USN-4226-1 (UBUNTU)
USN-4227-1 (UBUNTU)
USN-4227-2 (UBUNTU)
http://packetstormsecurity.com/files/155879/Kernel-Live-Patch-Security-Notice-LSN-0061-1.html (MISC)
[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update (MLIST)
USN-4225-2 (UBUNTU)
http://packetstormsecurity.com/files/156185/Kernel-Live-Patch-Security-Notice-LSN-0062-1.html (MISC)
[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update (MLIST)
openSUSE-SU-2020:0336 (SUSE)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MN6MLCN7G7VFTSXSZYXKXEFCUMFBUAXQ/ (MISC)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D4ISVNIC44SOGXTUBCIZFSUNQJ5LRKNZ/ (MISC)
CVE: CVE-2019-14901
CVE: CVE-2019-14901
Id:
CVE-2019-14901
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14901
Comment
: A heap overflow flaw was found in the Linux kernel, all versions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. The vulnerability allows a remote attacker to cause a system crash, resulting in a denial of service, or execute arbitrary code. The highest threat with this vulnerability is with the availability of the system. If code execution occurs, the code will run with the permissions of root. This will affect both confidentiality and integrity of files on the system.
CVSSv2 Score:
10
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSSv3 Score:
9.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE:
400 (Uncontrolled Resource Consumption ('Resource Exhaustion'))
References:
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14901 (CONFIRM)
openSUSE-SU-2019:2675 (SUSE)
USN-4228-1 (UBUNTU)
USN-4227-1 (UBUNTU)
USN-4225-1 (UBUNTU)
USN-4228-2 (UBUNTU)
USN-4226-1 (UBUNTU)
USN-4227-2 (UBUNTU)
http://packetstormsecurity.com/files/155879/Kernel-Live-Patch-Security-Notice-LSN-0061-1.html (MISC)
[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update (MLIST)
USN-4225-2 (UBUNTU)
RHSA-2020:0204 (REDHAT)
http://packetstormsecurity.com/files/156185/Kernel-Live-Patch-Security-Notice-LSN-0062-1.html (MISC)
RHSA-2020:0328 (REDHAT)
RHSA-2020:0339 (REDHAT)
RHSA-2020:0375 (REDHAT)
RHSA-2020:0374 (REDHAT)
[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update (MLIST)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MN6MLCN7G7VFTSXSZYXKXEFCUMFBUAXQ/ (MISC)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D4ISVNIC44SOGXTUBCIZFSUNQJ5LRKNZ/ (MISC)
CVE: CVE-2019-15098
CVE: CVE-2019-15098
Id:
CVE-2019-15098
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15098
Comment
: drivers/net/wireless/ath/ath6kl/usb.c in the Linux kernel through 5.2.9 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.
CVSSv2 Score:
4.9
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:C
CVSSv3 Score:
4.6
Attack vector:
PHYSICAL
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CWE:
476 (NULL Pointer Dereference)
References:
https://security.netapp.com/advisory/ntap-20190905-0002/ (CONFIRM)
openSUSE-SU-2019:2173 (SUSE)
openSUSE-SU-2019:2181 (SUSE)
[oss-security] 20190927 Re: Linux kernel: multiple vulnerabilities in the USB subsystem x2 (MLIST)
[oss-security] 20190927 Re: Linux kernel: multiple vulnerabilities in the USB subsystem x2 (MLIST)
[oss-security] 20190927 Re: Linux kernel: multiple vulnerabilities in the USB subsystem x2 (MLIST)
https://support.f5.com/csp/article/K61214359 (CONFIRM)
20191108 [slackware-security] Slackware 14.2 kernel (SSA:2019-311-01) (BUGTRAQ)
http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html (MISC)
USN-4185-1 (UBUNTU)
USN-4184-1 (UBUNTU)
USN-4186-1 (UBUNTU)
USN-4186-2 (UBUNTU)
[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update (MLIST)
[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update (MLIST)
https://lore.kernel.org/linux-wireless/20190804002905.11292-1-benquike%40gmail.com/T/#u ()
https://support.f5.com/csp/article/K61214359?utm_source=f5support&%3Butm_medium=RSS ()
CVE: CVE-2019-15217
CVE: CVE-2019-15217
Id:
CVE-2019-15217
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15217
Comment
: An issue was discovered in the Linux kernel before 5.2.3. There is a NULL pointer dereference caused by a malicious USB device in the drivers/media/usb/zr364xx/zr364xx.c driver.
CVSSv2 Score:
4.9
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:C
CVSSv3 Score:
4.6
Attack vector:
PHYSICAL
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CWE:
476 (NULL Pointer Dereference)
References:
https://syzkaller.appspot.com/bug?id=9c0c178c24d828a7378f483309001329750aad64 (MISC)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5d2e73a5f80a5b5aff3caf1ec6d39b5b3f54b26e (MISC)
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3 (MISC)
[oss-security] 20190820 Linux kernel: multiple vulnerabilities in the USB subsystem x2 (MLIST)
[oss-security] 20190822 Re: Linux kernel: multiple vulnerabilities in the USB subsystem x2 (MLIST)
[oss-security] 20190822 Re: Linux kernel: multiple vulnerabilities in the USB subsystem x2 (MLIST)
[oss-security] 20190822 Re: Linux kernel: multiple vulnerabilities in the USB subsystem x2 (MLIST)
[oss-security] 20190822 Re: Linux kernel: multiple vulnerabilities in the USB subsystem x2 (MLIST)
https://security.netapp.com/advisory/ntap-20190905-0002/ (CONFIRM)
openSUSE-SU-2019:2173 (SUSE)
openSUSE-SU-2019:2181 (SUSE)
USN-4147-1 (UBUNTU)
[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update (MLIST)
USN-4286-2 (UBUNTU)
[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update (MLIST)
USN-4286-1 (UBUNTU)
USN-4302-1 (UBUNTU)
CVE: CVE-2019-15291
CVE: CVE-2019-15291
Id:
CVE-2019-15291
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15291
Comment
: An issue was discovered in the Linux kernel through 5.2.9. There is a NULL pointer dereference caused by a malicious USB device in the flexcop_usb_probe function in the drivers/media/usb/b2c2/flexcop-usb.c driver.
CVSSv2 Score:
4.9
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:C
CVSSv3 Score:
4.6
Attack vector:
PHYSICAL
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CWE:
476 (NULL Pointer Dereference)
References:
https://syzkaller.appspot.com/bug?id=c0203bd72037d07493f4b7562411e4f5f4553a8f (MISC)
[oss-security] 20190820 Linux kernel: multiple vulnerabilities in the USB subsystem x2 (MLIST)
[oss-security] 20190821 Re: Linux kernel: multiple vulnerabilities in the USB subsystem x2 (MLIST)
https://security.netapp.com/advisory/ntap-20190905-0002/ (CONFIRM)
openSUSE-SU-2019:2307 (SUSE)
openSUSE-SU-2019:2308 (SUSE)
20200109 [slackware-security] Slackware 14.2 kernel (SSA:2020-008-01) (BUGTRAQ)
http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html (MISC)
[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update (MLIST)
USN-4254-1 (UBUNTU)
USN-4254-2 (UBUNTU)
USN-4258-1 (UBUNTU)
USN-4287-1 (UBUNTU)
USN-4287-2 (UBUNTU)
[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update (MLIST)
USN-4284-1 (UBUNTU)
CVE: CVE-2019-15505
CVE: CVE-2019-15505
Id:
CVE-2019-15505
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15505
Comment
: drivers/media/usb/dvb-usb/technisat-usb2.c in the Linux kernel through 5.2.9 has an out-of-bounds read via crafted USB device traffic (which may be remote via usbip or usbredir).
CVSSv2 Score:
10
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSSv3 Score:
9.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE:
125 (Out-of-bounds Read)
References:
https://git.linuxtv.org/media_tree.git/commit/?id=0c4df39e504bf925ab666132ac3c98d6cbbe380b (MISC)
https://security.netapp.com/advisory/ntap-20190905-0002/ (CONFIRM)
https://support.f5.com/csp/article/K28222050 (CONFIRM)
USN-4157-1 (UBUNTU)
USN-4157-2 (UBUNTU)
USN-4162-1 (UBUNTU)
USN-4163-1 (UBUNTU)
USN-4163-2 (UBUNTU)
USN-4162-2 (UBUNTU)
20191108 [slackware-security] Slackware 14.2 kernel (SSA:2019-311-01) (BUGTRAQ)
http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html (MISC)
[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update (MLIST)
[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update (MLIST)
https://lore.kernel.org/lkml/b9b256cb-95f2-5fa1-9956-5a602a017c11%40gmail.com/ ()
https://lore.kernel.org/linux-media/20190821104408.w7krumcglxo6fz5q%40gofer.mess.org/ ()
FEDORA-2019-4c91a2f76e ()
FEDORA-2019-97380355ae ()
https://support.f5.com/csp/article/K28222050?utm_source=f5support&%3Butm_medium=RSS ()
CVE: CVE-2019-16746
CVE: CVE-2019-16746
Id:
CVE-2019-16746
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16746
Comment
: An issue was discovered in net/wireless/nl80211.c in the Linux kernel through 5.2.17. It does not check the length of variable elements in a beacon head, leading to a buffer overflow.
CVSSv2 Score:
7.5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSSv3 Score:
9.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE:
120 (Buffer Copy without Checking Size of Input ('Classic Buffer Overflow'))
References:
https://marc.info/?l=linux-wireless&m=156901391225058&w=2 (MISC)
https://security.netapp.com/advisory/ntap-20191031-0005/ (CONFIRM)
20191108 [slackware-security] Slackware 14.2 kernel (SSA:2019-311-01) (BUGTRAQ)
http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html (MISC)
USN-4186-1 (UBUNTU)
USN-4183-1 (UBUNTU)
USN-4210-1 (UBUNTU)
USN-4209-1 (UBUNTU)
[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update (MLIST)
[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update (MLIST)
openSUSE-SU-2020:0336 (SUSE)
openSUSE-SU-2020:1153 (SUSE)
https://www.oracle.com/security-alerts/cpuApr2021.html (MISC)
FEDORA-2019-057d691fd4 ()
CVE: CVE-2019-17052
CVE: CVE-2019-17052
Id:
CVE-2019-17052
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17052
Comment
: ax25_create in net/ax25/af_ax25.c in the AF_AX25 network module in the Linux kernel 3.16 through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-0614e2b73768.
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
PARTIAL
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:P/A:N
CVSSv3 Score:
3.3
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
LOW
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
CWE:
276 (Incorrect Default Permissions)
References:
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0614e2b73768b502fc32a75349823356d98aae2c (MISC)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0edc3f703f7bcaf550774b5d43ab727bcd0fe06b (MISC)
20191108 [slackware-security] Slackware 14.2 kernel (SSA:2019-311-01) (BUGTRAQ)
http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html (MISC)
USN-4184-1 (UBUNTU)
USN-4185-1 (UBUNTU)
USN-4186-1 (UBUNTU)
USN-4185-2 (UBUNTU)
USN-4186-2 (UBUNTU)
[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update (MLIST)
[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update (MLIST)
https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=2c675dab816278a1724c1e93b384c2f05a11cb31 (MISC)
FEDORA-2019-41e28660ae ()
CVE: CVE-2019-17053
CVE: CVE-2019-17053
Id:
CVE-2019-17053
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17053
Comment
: ieee802154_create in net/ieee802154/socket.c in the AF_IEEE802154 network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-e69dbd4619e7.
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
PARTIAL
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:P/A:N
CVSSv3 Score:
3.3
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
LOW
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
CWE:
276 (Incorrect Default Permissions)
References:
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e69dbd4619e7674c1679cba49afd9dd9ac347eef (MISC)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0edc3f703f7bcaf550774b5d43ab727bcd0fe06b (MISC)
20191108 [slackware-security] Slackware 14.2 kernel (SSA:2019-311-01) (BUGTRAQ)
http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html (MISC)
USN-4184-1 (UBUNTU)
USN-4185-1 (UBUNTU)
USN-4186-1 (UBUNTU)
USN-4185-2 (UBUNTU)
USN-4186-2 (UBUNTU)
[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update (MLIST)
[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update (MLIST)
FEDORA-2019-41e28660ae ()
CVE: CVE-2019-17054
CVE: CVE-2019-17054
Id:
CVE-2019-17054
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17054
Comment
: atalk_create in net/appletalk/ddp.c in the AF_APPLETALK network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-6cc03e8aa36c.
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
PARTIAL
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:P/A:N
CVSSv3 Score:
3.3
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
LOW
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
CWE:
276 (Incorrect Default Permissions)
References:
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6cc03e8aa36c51f3b26a0d21a3c4ce2809c842ac (MISC)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0edc3f703f7bcaf550774b5d43ab727bcd0fe06b (MISC)
20191108 [slackware-security] Slackware 14.2 kernel (SSA:2019-311-01) (BUGTRAQ)
http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html (MISC)
USN-4184-1 (UBUNTU)
USN-4185-1 (UBUNTU)
USN-4186-1 (UBUNTU)
USN-4185-2 (UBUNTU)
USN-4186-2 (UBUNTU)
[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update (MLIST)
[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update (MLIST)
FEDORA-2019-41e28660ae ()
CVE: CVE-2019-17055
CVE: CVE-2019-17055
Id:
CVE-2019-17055
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17055
Comment
: base_sock_create in drivers/isdn/mISDN/socket.c in the AF_ISDN network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-b91ee4aa2a21.
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
PARTIAL
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:P/A:N
CVSSv3 Score:
3.3
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
LOW
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
CWE:
862 (Missing Authorization)
References:
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b91ee4aa2a2199ba4d4650706c272985a5a32d80 (MISC)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0edc3f703f7bcaf550774b5d43ab727bcd0fe06b (MISC)
20191108 [slackware-security] Slackware 14.2 kernel (SSA:2019-311-01) (BUGTRAQ)
http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html (MISC)
USN-4184-1 (UBUNTU)
USN-4185-1 (UBUNTU)
USN-4186-1 (UBUNTU)
openSUSE-SU-2019:2503 (SUSE)
openSUSE-SU-2019:2507 (SUSE)
USN-4185-2 (UBUNTU)
USN-4186-2 (UBUNTU)
[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update (MLIST)
[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update (MLIST)
RHSA-2020:0790 (REDHAT)
FEDORA-2019-41e28660ae ()
CVE: CVE-2019-17056
CVE: CVE-2019-17056
Id:
CVE-2019-17056
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17056
Comment
: llcp_sock_create in net/nfc/llcp_sock.c in the AF_NFC network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-3a359798b176.
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
PARTIAL
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:P/A:N
CVSSv3 Score:
3.3
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
LOW
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
CWE:
276 (Incorrect Default Permissions)
References:
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3a359798b176183ef09efb7a3dc59abad1cc7104 (MISC)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0edc3f703f7bcaf550774b5d43ab727bcd0fe06b (MISC)
openSUSE-SU-2019:2392 (SUSE)
openSUSE-SU-2019:2444 (SUSE)
20191108 [slackware-security] Slackware 14.2 kernel (SSA:2019-311-01) (BUGTRAQ)
http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html (MISC)
USN-4184-1 (UBUNTU)
USN-4185-1 (UBUNTU)
USN-4186-1 (UBUNTU)
USN-4185-2 (UBUNTU)
USN-4186-2 (UBUNTU)
[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update (MLIST)
[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update (MLIST)
FEDORA-2019-41e28660ae ()
CVE: CVE-2019-17133
CVE: CVE-2019-17133
Id:
CVE-2019-17133
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17133
Comment
: In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow.
CVSSv2 Score:
7.5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSSv3 Score:
9.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE:
120 (Buffer Copy without Checking Size of Input ('Classic Buffer Overflow'))
References:
https://marc.info/?l=linux-wireless&m=157018270915487&w=2 (MISC)
openSUSE-SU-2019:2392 (SUSE)
https://security.netapp.com/advisory/ntap-20191031-0005/ (CONFIRM)
openSUSE-SU-2019:2444 (SUSE)
20191108 [slackware-security] Slackware 14.2 kernel (SSA:2019-311-01) (BUGTRAQ)
http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html (MISC)
USN-4208-1 (UBUNTU)
USN-4210-1 (UBUNTU)
USN-4211-2 (UBUNTU)
USN-4211-1 (UBUNTU)
USN-4226-1 (UBUNTU)
[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update (MLIST)
RHSA-2020:0174 (REDHAT)
RHSA-2020:0375 (REDHAT)
RHSA-2020:0374 (REDHAT)
RHSA-2020:0543 (REDHAT)
RHSA-2020:0592 (REDHAT)
RHSA-2020:0609 (REDHAT)
[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update (MLIST)
RHSA-2020:0653 (REDHAT)
RHSA-2020:0661 (REDHAT)
RHSA-2020:0664 (REDHAT)
RHSA-2020:0790 (REDHAT)
https://www.oracle.com/security-alerts/cpuApr2021.html (MISC)
CVE: CVE-2019-17666
CVE: CVE-2019-17666
Id:
CVE-2019-17666
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17666
Comment
: rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.
CVSSv2 Score:
8.3
Access vector:
ADJACENT_NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:A/AC:L/Au:N/C:C/I:C/A:C
CVSSv3 Score:
8.8
Attack vector:
ADJACENT_NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE:
120 (Buffer Copy without Checking Size of Input ('Classic Buffer Overflow'))
References:
https://lkml.org/lkml/2019/10/16/1226 (MISC)
https://twitter.com/nicowaisman/status/1184864519316758535 (MISC)
https://arstechnica.com/information-technology/2019/10/unpatched-linux-flaw-may-let-attackers-crash-or-compromise-nearby-devices/ (MISC)
openSUSE-SU-2019:2392 (SUSE)
https://security.netapp.com/advisory/ntap-20191031-0005/ (CONFIRM)
openSUSE-SU-2019:2444 (SUSE)
USN-4184-1 (UBUNTU)
USN-4185-1 (UBUNTU)
USN-4186-1 (UBUNTU)
USN-4183-1 (UBUNTU)
USN-4186-2 (UBUNTU)
[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update (MLIST)
RHSA-2020:0328 (REDHAT)
RHSA-2020:0339 (REDHAT)
RHSA-2020:0543 (REDHAT)
[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update (MLIST)
RHSA-2020:0661 (REDHAT)
RHSA-2020:0740 (REDHAT)
FEDORA-2019-6a67ff8793 ()
CVE: CVE-2019-19051
CVE: CVE-2019-19051
Id:
CVE-2019-19051
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19051
Comment
: A memory leak in the i2400m_op_rfkill_sw_toggle() function in drivers/net/wimax/i2400m/op-rfkill.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-6f3ef5c25cc7.
CVSSv2 Score:
4.9
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:C
CVSSv3 Score:
5.5
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CWE:
401 (Improper Release of Memory Before Removing Last Reference ('Memory Leak'))
References:
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.11 (MISC)
https://github.com/torvalds/linux/commit/6f3ef5c25cc762687a7341c18cbea5af54461407 (MISC)
https://security.netapp.com/advisory/ntap-20191205-0001/ (CONFIRM)
USN-4225-1 (UBUNTU)
[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update (MLIST)
USN-4225-2 (UBUNTU)
USN-4286-2 (UBUNTU)
[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update (MLIST)
USN-4286-1 (UBUNTU)
openSUSE-SU-2020:0336 (SUSE)
USN-4302-1 (UBUNTU)
USN-4344-1 (UBUNTU)
CVE: CVE-2019-19052
CVE: CVE-2019-19052
Id:
CVE-2019-19052
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19052
Comment
: A memory leak in the gs_can_open() function in drivers/net/can/usb/gs_usb.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-fb5be6a7b486.
CVSSv2 Score:
7.8
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:C
CVSSv3 Score:
7.5
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CWE:
401 (Improper Release of Memory Before Removing Last Reference ('Memory Leak'))
References:
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.11 (MISC)
https://github.com/torvalds/linux/commit/fb5be6a7b4863ecc44963bb80ca614584b6c7817 (MISC)
https://security.netapp.com/advisory/ntap-20191205-0001/ (CONFIRM)
openSUSE-SU-2019:2675 (SUSE)
USN-4228-1 (UBUNTU)
USN-4227-1 (UBUNTU)
USN-4225-1 (UBUNTU)
USN-4228-2 (UBUNTU)
USN-4226-1 (UBUNTU)
USN-4227-2 (UBUNTU)
[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update (MLIST)
USN-4225-2 (UBUNTU)
[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update (MLIST)
https://www.oracle.com/security-alerts/cpuApr2021.html (MISC)
CVE: CVE-2019-19056
CVE: CVE-2019-19056
Id:
CVE-2019-19056
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19056
Comment
: A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function in drivers/net/wireless/marvell/mwifiex/pcie.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures, aka CID-db8fd2cde932.
CVSSv2 Score:
4.7
Access vector:
LOCAL
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:M/Au:N/C:N/I:N/A:C
CVSSv3 Score:
4.7
Attack vector:
LOCAL
Attack complexity:
HIGH
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
CWE:
401 (Improper Release of Memory Before Removing Last Reference ('Memory Leak'))
References:
https://github.com/torvalds/linux/commit/db8fd2cde93227e566a412cf53173ffa227998bc (MISC)
https://security.netapp.com/advisory/ntap-20191205-0001/ (CONFIRM)
openSUSE-SU-2019:2675 (SUSE)
[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update (MLIST)
USN-4286-2 (UBUNTU)
[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update (MLIST)
USN-4286-1 (UBUNTU)
USN-4300-1 (UBUNTU)
USN-4301-1 (UBUNTU)
USN-4302-1 (UBUNTU)
FEDORA-2019-021c968423 ()
FEDORA-2019-34a75d7e61 ()
CVE: CVE-2019-19057
CVE: CVE-2019-19057
Id:
CVE-2019-19057
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19057
Comment
: Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/marvell/mwifiex/pcie.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures, aka CID-d10dcb615c8e.
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:P
CVSSv3 Score:
3.3
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
LOW
CVSSv3 Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
CWE:
401 (Improper Release of Memory Before Removing Last Reference ('Memory Leak'))
References:
https://github.com/torvalds/linux/commit/d10dcb615c8e29d403a24d35f8310a7a53e3050c (MISC)
https://security.netapp.com/advisory/ntap-20191205-0001/ (CONFIRM)
openSUSE-SU-2019:2675 (SUSE)
20200109 [slackware-security] Slackware 14.2 kernel (SSA:2020-008-01) (BUGTRAQ)
http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html (MISC)
[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update (MLIST)
USN-4254-1 (UBUNTU)
USN-4254-2 (UBUNTU)
USN-4285-1 (UBUNTU)
USN-4287-1 (UBUNTU)
USN-4287-2 (UBUNTU)
[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update (MLIST)
USN-4284-1 (UBUNTU)
FEDORA-2019-021c968423 ()
FEDORA-2019-34a75d7e61 ()
CVE: CVE-2019-19062
CVE: CVE-2019-19062
Id:
CVE-2019-19062
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19062
Comment
: A memory leak in the crypto_report() function in crypto/crypto_user_base.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering crypto_report_alg() failures, aka CID-ffdde5932042.
CVSSv2 Score:
4.7
Access vector:
LOCAL
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:M/Au:N/C:N/I:N/A:C
CVSSv3 Score:
4.7
Attack vector:
LOCAL
Attack complexity:
HIGH
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
CWE:
401 (Improper Release of Memory Before Removing Last Reference ('Memory Leak'))
References:
https://github.com/torvalds/linux/commit/ffdde5932042600c6807d46c1550b28b0db6a3bc (MISC)
https://security.netapp.com/advisory/ntap-20191205-0001/ (CONFIRM)
openSUSE-SU-2019:2675 (SUSE)
20200109 [slackware-security] Slackware 14.2 kernel (SSA:2020-008-01) (BUGTRAQ)
http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html (MISC)
[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update (MLIST)
USN-4254-1 (UBUNTU)
USN-4254-2 (UBUNTU)
USN-4258-1 (UBUNTU)
USN-4287-1 (UBUNTU)
USN-4287-2 (UBUNTU)
[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update (MLIST)
USN-4284-1 (UBUNTU)
FEDORA-2019-021c968423 ()
FEDORA-2019-34a75d7e61 ()
CVE: CVE-2019-19066
CVE: CVE-2019-19066
Id:
CVE-2019-19066
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19066
Comment
: A memory leak in the bfad_im_get_stats() function in drivers/scsi/bfa/bfad_attr.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering bfa_port_get_stats() failures, aka CID-0e62395da2bd.
CVSSv2 Score:
4.7
Access vector:
LOCAL
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:M/Au:N/C:N/I:N/A:C
CVSSv3 Score:
4.7
Attack vector:
LOCAL
Attack complexity:
HIGH
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
CWE:
401 (Improper Release of Memory Before Removing Last Reference ('Memory Leak'))
References:
https://github.com/torvalds/linux/commit/0e62395da2bd5166d7c9e14cbc7503b256a34cb0 (MISC)
https://security.netapp.com/advisory/ntap-20191205-0001/ (CONFIRM)
[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update (MLIST)
USN-4286-2 (UBUNTU)
[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update (MLIST)
USN-4286-1 (UBUNTU)
openSUSE-SU-2020:0336 (SUSE)
USN-4300-1 (UBUNTU)
USN-4301-1 (UBUNTU)
USN-4302-1 (UBUNTU)
https://www.oracle.com/security-alerts/cpuApr2021.html (MISC)
FEDORA-2019-021c968423 ()
FEDORA-2019-34a75d7e61 ()
CVE: CVE-2019-19227
CVE: CVE-2019-19227
Id:
CVE-2019-19227
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19227
Comment
: In the AppleTalk subsystem in the Linux kernel before 5.1, there is a potential NULL pointer dereference because register_snap_client may return NULL. This will lead to denial of service in net/appletalk/aarp.c and net/appletalk/ddp.c, as demonstrated by unregister_snap_client, aka CID-9804501fa122.
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:P
CVSSv3 Score:
5.5
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CWE:
476 (NULL Pointer Dereference)
References:
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9804501fa1228048857910a6bf23e085aade37cc (MISC)
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1 (MISC)
openSUSE-SU-2019:2675 (SUSE)
https://security.netapp.com/advisory/ntap-20200103-0001/ (CONFIRM)
20200109 [slackware-security] Slackware 14.2 kernel (SSA:2020-008-01) (BUGTRAQ)
http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html (MISC)
[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update (MLIST)
USN-4254-1 (UBUNTU)
USN-4254-2 (UBUNTU)
USN-4258-1 (UBUNTU)
USN-4287-1 (UBUNTU)
USN-4287-2 (UBUNTU)
[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update (MLIST)
CVE: CVE-2019-19332
CVE: CVE-2019-19332
Id:
CVE-2019-19332
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19332
Comment
: An out-of-bounds memory write issue was found in the Linux Kernel, version 3.13 through 5.4, in the way the Linux kernel's KVM hypervisor handled the 'KVM_GET_EMULATED_CPUID' ioctl(2) request to get CPUID features emulated by the KVM hypervisor. A user or process able to access the '/dev/kvm' device could use this flaw to crash the system, resulting in a denial of service.
CVSSv2 Score:
5.6
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
PARTIAL
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:P/A:C
CVSSv3 Score:
6.1
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
LOW
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
CWE:
787 (Out-of-bounds Write)
References:
https://www.openwall.com/lists/oss-security/2019/12/16/1 (MISC)
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-19332 (CONFIRM)
http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html (MISC)
[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update (MLIST)
USN-4254-1 (UBUNTU)
USN-4254-2 (UBUNTU)
https://security.netapp.com/advisory/ntap-20200204-0002/ (CONFIRM)
USN-4258-1 (UBUNTU)
USN-4287-1 (UBUNTU)
USN-4287-2 (UBUNTU)
[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update (MLIST)
USN-4284-1 (UBUNTU)
openSUSE-SU-2020:0336 (SUSE)
https://lore.kernel.org/kvm/000000000000ea5ec20598d90e50%40google.com/ (MISC)
CVE: CVE-2019-19523
CVE: CVE-2019-19523
Id:
CVE-2019-19523
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19523
Comment
: In the Linux kernel before 5.3.7, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/adutux.c driver, aka CID-44efc269db79.
CVSSv2 Score:
4.9
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:C
CVSSv3 Score:
4.6
Attack vector:
PHYSICAL
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CWE:
416 (Use After Free)
References:
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=44efc269db7929f6275a1fa927ef082e533ecde0 (MISC)
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.7 (MISC)
[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3 (MLIST)
[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update (MLIST)
[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update (MLIST)
openSUSE-SU-2020:0336 (SUSE)
CVE: CVE-2019-19524
CVE: CVE-2019-19524
Id:
CVE-2019-19524
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19524
Comment
: In the Linux kernel before 5.3.12, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/input/ff-memless.c driver, aka CID-fa3a5a1880c9.
CVSSv2 Score:
4.9
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:C
CVSSv3 Score:
4.6
Attack vector:
PHYSICAL
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CWE:
416 (Use After Free)
References:
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fa3a5a1880c91bb92594ad42dfe9eedad7996b86 (MISC)
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.12 (MISC)
[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3 (MLIST)
openSUSE-SU-2019:2675 (SUSE)
USN-4228-1 (UBUNTU)
USN-4227-1 (UBUNTU)
USN-4225-1 (UBUNTU)
USN-4228-2 (UBUNTU)
USN-4226-1 (UBUNTU)
USN-4227-2 (UBUNTU)
20200109 [slackware-security] Slackware 14.2 kernel (SSA:2020-008-01) (BUGTRAQ)
http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html (MISC)
[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update (MLIST)
USN-4225-2 (UBUNTU)
[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update (MLIST)
CVE: CVE-2019-19527
CVE: CVE-2019-19527
Id:
CVE-2019-19527
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19527
Comment
: In the Linux kernel before 5.2.10, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver, aka CID-9c09b214f30e.
CVSSv2 Score:
7.2
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSSv3 Score:
6.8
Attack vector:
PHYSICAL
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE:
416 (Use After Free)
References:
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.10 (MISC)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9c09b214f30e3c11f9b0b03f89442df03643794d (MISC)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6d4472d7bec39917b54e4e80245784ea5d60ce49 (MISC)
[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3 (MLIST)
[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update (MLIST)
[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update (MLIST)
openSUSE-SU-2020:0336 (SUSE)
CVE: CVE-2019-19530
CVE: CVE-2019-19530
Id:
CVE-2019-19530
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19530
Comment
: In the Linux kernel before 5.2.10, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/class/cdc-acm.c driver, aka CID-c52873e5a1ef.
CVSSv2 Score:
4.9
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:C
CVSSv3 Score:
4.6
Attack vector:
PHYSICAL
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CWE:
416 (Use After Free)
References:
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.10 (MISC)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c52873e5a1ef72f845526d9f6a50704433f9c625 (MISC)
[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3 (MLIST)
openSUSE-SU-2019:2675 (SUSE)
[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update (MLIST)
[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update (MLIST)
CVE: CVE-2019-19531
CVE: CVE-2019-19531
Id:
CVE-2019-19531
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19531
Comment
: In the Linux kernel before 5.2.9, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/yurex.c driver, aka CID-fc05481b2fca.
CVSSv2 Score:
4.6
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:P/I:P/A:P
CVSSv3 Score:
6.8
Attack vector:
PHYSICAL
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE:
416 (Use After Free)
References:
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fc05481b2fcabaaeccf63e32ac1baab54e5b6963 (MISC)
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.9 (MISC)
[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3 (MLIST)
openSUSE-SU-2019:2675 (SUSE)
[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update (MLIST)
[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update (MLIST)
CVE: CVE-2019-19532
CVE: CVE-2019-19532
Id:
CVE-2019-19532
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19532
Comment
: In the Linux kernel before 5.3.9, there are multiple out-of-bounds write bugs that can be caused by a malicious USB device in the Linux kernel HID drivers, aka CID-d9d4b1e46d95. This affects drivers/hid/hid-axff.c, drivers/hid/hid-dr.c, drivers/hid/hid-emsff.c, drivers/hid/hid-gaff.c, drivers/hid/hid-holtekff.c, drivers/hid/hid-lg2ff.c, drivers/hid/hid-lg3ff.c, drivers/hid/hid-lg4ff.c, drivers/hid/hid-lgff.c, drivers/hid/hid-logitech-hidpp.c, drivers/hid/hid-microsoft.c, drivers/hid/hid-sony.c, drivers/hid/hid-tmff.c, and drivers/hid/hid-zpff.c.
CVSSv2 Score:
4.6
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:P/I:P/A:P
CVSSv3 Score:
6.8
Attack vector:
PHYSICAL
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE:
787 (Out-of-bounds Write)
References:
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d9d4b1e46d9543a82c23f6df03f4ad697dab361b (MISC)
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.9 (MISC)
[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3 (MLIST)
USN-4226-1 (UBUNTU)
[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update (MLIST)
[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update (MLIST)
openSUSE-SU-2020:0336 (SUSE)
CVE: CVE-2019-19533
CVE: CVE-2019-19533
Id:
CVE-2019-19533
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19533
Comment
: In the Linux kernel before 5.3.4, there is an info-leak bug that can be caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c driver, aka CID-a10feaf8c464.
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:P/I:N/A:N
CVSSv3 Score:
2.4
Attack vector:
PHYSICAL
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
LOW
Integrity impact:
NONE
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CWE:
772 (Missing Release of Resource after Effective Lifetime)
References:
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.4 (MISC)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a10feaf8c464c3f9cfdd3a8a7ce17e1c0d498da1 (MISC)
[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3 (MLIST)
[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update (MLIST)
[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update (MLIST)
openSUSE-SU-2020:0336 (SUSE)
CVE: CVE-2019-19534
CVE: CVE-2019-19534
Id:
CVE-2019-19534
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19534
Comment
: In the Linux kernel before 5.3.11, there is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver, aka CID-f7a1337f0d29.
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:P/I:N/A:N
CVSSv3 Score:
2.4
Attack vector:
PHYSICAL
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
LOW
Integrity impact:
NONE
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CWE:
909 ()
References:
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.11 (MISC)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f7a1337f0d29b98733c8824e165fca3371d7d4fd (MISC)
[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3 (MLIST)
openSUSE-SU-2019:2675 (SUSE)
USN-4228-1 (UBUNTU)
USN-4227-1 (UBUNTU)
USN-4225-1 (UBUNTU)
USN-4228-2 (UBUNTU)
USN-4226-1 (UBUNTU)
USN-4227-2 (UBUNTU)
[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update (MLIST)
USN-4225-2 (UBUNTU)
[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update (MLIST)
CVE: CVE-2019-19536
CVE: CVE-2019-19536
Id:
CVE-2019-19536
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19536
Comment
: In the Linux kernel before 5.2.9, there is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_pro.c driver, aka CID-ead16e53c2f0.
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:P/I:N/A:N
CVSSv3 Score:
4.6
Attack vector:
PHYSICAL
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
NONE
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CWE:
909 ()
References:
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.9 (MISC)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ead16e53c2f0ed946d82d4037c630e2f60f4ab69 (MISC)
[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3 (MLIST)
openSUSE-SU-2019:2675 (SUSE)
[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update (MLIST)
[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update (MLIST)
CVE: CVE-2019-19537
CVE: CVE-2019-19537
Id:
CVE-2019-19537
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19537
Comment
: In the Linux kernel before 5.2.10, there is a race condition bug that can be caused by a malicious USB device in the USB character device driver layer, aka CID-303911cfc5b9. This affects drivers/usb/core/file.c.
CVSSv2 Score:
4.7
Access vector:
LOCAL
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:M/Au:N/C:N/I:N/A:C
CVSSv3 Score:
4.2
Attack vector:
PHYSICAL
Attack complexity:
HIGH
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
CWE:
362 (Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition'))
References:
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.10 (MISC)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=303911cfc5b95d33687d9046133ff184cf5043ff (MISC)
[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3 (MLIST)
[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update (MLIST)
[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update (MLIST)
openSUSE-SU-2020:0336 (SUSE)
CVE: CVE-2019-19767
CVE: CVE-2019-19767
Id:
CVE-2019-19767
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19767
Comment
: The Linux kernel before 5.4.2 mishandles ext4_expand_extra_isize, as demonstrated by use-after-free errors in __ext4_expand_extra_isize and ext4_xattr_set_entry, related to fs/ext4/inode.c and fs/ext4/super.c, aka CID-4ea99936a163.
CVSSv2 Score:
4.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:N/I:N/A:P
CVSSv3 Score:
5.5
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CWE:
416 (Use After Free)
References:
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.2 (MISC)
https://github.com/torvalds/linux/commit/4ea99936a1630f51fc3a2d61a58ec4a1c4b7d55a (MISC)
https://bugzilla.kernel.org/show_bug.cgi?id=205609 (MISC)
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4ea99936a1630f51fc3a2d61a58ec4a1c4b7d55a (MISC)
https://bugzilla.kernel.org/show_bug.cgi?id=205707 (MISC)
https://security.netapp.com/advisory/ntap-20200103-0001/ (CONFIRM)
[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update (MLIST)
USN-4258-1 (UBUNTU)
USN-4287-1 (UBUNTU)
USN-4287-2 (UBUNTU)
[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update (MLIST)
USN-4284-1 (UBUNTU)
openSUSE-SU-2020:0336 (SUSE)
CVE: CVE-2019-19922
CVE: CVE-2019-19922
Id:
CVE-2019-19922
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19922
Comment
: kernel/sched/fair.c in the Linux kernel before 5.3.9, when cpu.cfs_quota_us is used (e.g., with Kubernetes), allows attackers to cause a denial of service against non-cpu-bound applications by generating a workload that triggers unwanted slice expiration, aka CID-de53fd7aedb1. (In other words, although this slice expiration would typically be seen with benign workloads, it is possible that an attacker could calculate how many stray requests are required to force an entire Kubernetes cluster into a low-performance state caused by slice expiration, and ensure that a DDoS attack sent that number of stray requests. An attack does not affect the stability of the kernel; it only causes mismanagement of application execution.)
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:P
CVSSv3 Score:
5.5
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CWE:
400 (Uncontrolled Resource Consumption ('Resource Exhaustion'))
References:
https://relistan.com/the-kernel-may-be-slowing-down-your-app (MISC)
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=de53fd7aedb100f03e5d2231cfce0e4993282425 (MISC)
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.9 (MISC)
https://github.com/torvalds/linux/commit/de53fd7aedb100f03e5d2231cfce0e4993282425 (MISC)
https://github.com/kubernetes/kubernetes/issues/67577 (MISC)
USN-4226-1 (UBUNTU)
[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update (MLIST)
https://security.netapp.com/advisory/ntap-20200204-0002/ (CONFIRM)
https://www.oracle.com/security-alerts/cpuApr2021.html (MISC)
CVE: CVE-2019-19947
CVE: CVE-2019-19947
Id:
CVE-2019-19947
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19947
Comment
: In the Linux kernel through 5.4.6, there are information leaks of uninitialized memory to a USB device in the drivers/net/can/usb/kvaser_usb/kvaser_usb_leaf.c driver, aka CID-da2311a6385c.
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:P/I:N/A:N
CVSSv3 Score:
4.6
Attack vector:
PHYSICAL
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
NONE
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CWE:
908 ()
References:
https://github.com/torvalds/linux/commit/da2311a6385c3b499da2ed5d9be59ce331fa93e9 (MISC)
[oss-security] 20191224 CVE-2019-19947: Linux kernel can: kvaser_usb: kvaser_usb_leaf: some info-leaks vulnerabilities (MLIST)
[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update (MLIST)
https://security.netapp.com/advisory/ntap-20200204-0002/ (CONFIRM)
USN-4285-1 (UBUNTU)
[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update (MLIST)
USN-4284-1 (UBUNTU)
USN-4427-1 (UBUNTU)
USN-4485-1 (UBUNTU)
CVE: CVE-2019-19965
CVE: CVE-2019-19965
Id:
CVE-2019-19965
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19965
Comment
: In the Linux kernel through 5.4.6, there is a NULL pointer dereference in drivers/scsi/libsas/sas_discover.c because of mishandling of port disconnection during discovery, related to a PHY down race condition, aka CID-f70267f379b5.
CVSSv2 Score:
1.9
Access vector:
LOCAL
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:L/AC:M/Au:N/C:N/I:N/A:P
CVSSv3 Score:
4.7
Attack vector:
LOCAL
Attack complexity:
HIGH
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
CWE:
476 (NULL Pointer Dereference)
References:
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f70267f379b5e5e11bdc5d72a56bf17e5feed01f (MISC)
[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update (MLIST)
https://security.netapp.com/advisory/ntap-20200204-0002/ (CONFIRM)
USN-4285-1 (UBUNTU)
USN-4287-1 (UBUNTU)
USN-4286-2 (UBUNTU)
USN-4287-2 (UBUNTU)
[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update (MLIST)
USN-4284-1 (UBUNTU)
USN-4286-1 (UBUNTU)
openSUSE-SU-2020:0336 (SUSE)
CVE: CVE-2019-19966
CVE: CVE-2019-19966
Id:
CVE-2019-19966
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19966
Comment
: In the Linux kernel before 5.1.6, there is a use-after-free in cpia2_exit() in drivers/media/usb/cpia2/cpia2_v4l.c that will cause denial of service, aka CID-dea37a972655.
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:P
CVSSv3 Score:
4.6
Attack vector:
PHYSICAL
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CWE:
416 (Use After Free)
References:
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dea37a97265588da604c6ba80160a287b72c7bfd (MISC)
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.6 (MISC)
[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update (MLIST)
https://security.netapp.com/advisory/ntap-20200204-0002/ (CONFIRM)
openSUSE-SU-2020:0336 (SUSE)
Content available only for registered users!
ovaldb@altx-soft.com