Executive Summary
Summary | |
---|---|
Title | Linux kernel vulnerability |
Informations | |||
---|---|---|---|
Name | USN-4183-2 | First vendor Publication | 2019-11-13 |
Vendor | Ubuntu | Last vendor Modification | 2019-11-13 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 19.10 Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux: Linux kernel Details: USN-4183-1 fixed vulnerabilities in the Linux kernel. It was discovered that the kernel fix for CVE-2019-0155 (i915 missing Blitter Command Streamer check) was incomplete on 64-bit Intel x86 systems. This update addresses the issue. We apologize for the inconvenience. Original advisory details: Stephan van Schaik, Alyssa Milburn, Sebastian Ă–sterlund, Pietro Frigo, It was discovered that the Intel i915 graphics chipsets allowed userspace Deepak Gupta discovered that on certain Intel processors, the Linux kernel It was discovered that the Intel i915 graphics chipsets could cause a Jann Horn discovered a reference count underflow in the shiftfs Jann Horn discovered a type confusion vulnerability in the shiftfs Jann Horn discovered that the shiftfs implementation in the Linux kernel It was discovered that a buffer overflow existed in the 802.11 Wi-Fi Nico Waisman discovered that a buffer overflow existed in the Realtek Wi-Fi Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 19.10: Please note that mitigating the TSX (CVE-2019-11135) and i915 (CVE-2019-0154) issues requires corresponding microcode and graphics firmware updates respectively. After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References: Package Information: |
Original Source
Url : http://www.ubuntu.com/usn/USN-4183-2 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-120 | Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') (CWE/SANS Top 25) |
CPE : Common Platform Enumeration
Alert History
Date | Informations |
---|---|
2019-11-13 21:19:06 |
|