Lucene search

K

Ubuntu: Security Advisory (USN-4325-1)

🗓️ 08 Apr 2020 00:00:00Reported by Copyright (C) 2020 Greenbone AGType 
openvas
 openvas
🔗 plugins.openvas.org👁 36 Views

Ubuntu: Security Advisory (USN-4325-1) - Denial of Service and Memory Vulnerabilitie

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Related
Refs
Code
ReporterTitlePublishedViews
Family
Ubuntu
Linux kernel vulnerabilities
10 Apr 202000:00
ubuntu
Ubuntu
Linux kernel vulnerabilities
7 Apr 202000:00
ubuntu
Ubuntu
Linux kernel vulnerability
6 Apr 202000:00
ubuntu
Ubuntu
Linux kernel vulnerabilities
7 Apr 202000:00
ubuntu
Ubuntu
Linux kernel vulnerabilities
6 Apr 202000:00
ubuntu
Ubuntu
Kernel Live Patch Security Notice
9 Apr 202000:00
ubuntu
Ubuntu
Linux kernel vulnerabilities
25 Mar 202000:00
ubuntu
OpenVAS
Ubuntu: Security Advisory (USN-4319-1)
7 Apr 202000:00
openvas
OpenVAS
Ubuntu: Security Advisory (USN-4320-1)
7 Apr 202000:00
openvas
OpenVAS
Ubuntu: Security Advisory (USN-4324-1)
8 Apr 202000:00
openvas
Rows per page
# SPDX-FileCopyrightText: 2020 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.844387");
  script_cve_id("CVE-2019-19046", "CVE-2020-8428");
  script_tag(name:"creation_date", value:"2020-04-08 03:00:26 +0000 (Wed, 08 Apr 2020)");
  script_version("2024-02-02T05:06:07+0000");
  script_tag(name:"last_modification", value:"2024-02-02 05:06:07 +0000 (Fri, 02 Feb 2024)");
  script_tag(name:"cvss_base", value:"6.8");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:S/C:N/I:N/A:C");
  script_tag(name:"severity_vector", value:"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H");
  script_tag(name:"severity_origin", value:"NVD");
  script_tag(name:"severity_date", value:"2020-03-24 12:57:20 +0000 (Tue, 24 Mar 2020)");

  script_name("Ubuntu: Security Advisory (USN-4325-1)");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2020 Greenbone AG");
  script_family("Ubuntu Local Security Checks");
  script_dependencies("gather-package-list.nasl");
  script_mandatory_keys("ssh/login/ubuntu_linux", "ssh/login/packages", re:"ssh/login/release=UBUNTU18\.04\ LTS");

  script_xref(name:"Advisory-ID", value:"USN-4325-1");
  script_xref(name:"URL", value:"https://ubuntu.com/security/notices/USN-4325-1");

  script_tag(name:"summary", value:"The remote host is missing an update for the 'linux-azure, linux-gcp, linux-gke-5.0, linux-oem-osp1, linux-oracle-5.0' package(s) announced via the USN-4325-1 advisory.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable package version is present on the target host.");

  script_tag(name:"insight", value:"It was discovered that the IPMI message handler implementation in the Linux
kernel did not properly deallocate memory in certain situations. A local
attacker could use this to cause a denial of service (kernel memory
exhaustion). (CVE-2019-19046)

Al Viro discovered that the vfs layer in the Linux kernel contained a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly expose sensitive information (kernel
memory). (CVE-2020-8428)");

  script_tag(name:"affected", value:"'linux-azure, linux-gcp, linux-gke-5.0, linux-oem-osp1, linux-oracle-5.0' package(s) on Ubuntu 18.04.");

  script_tag(name:"solution", value:"Please install the updated package(s).");

  script_tag(name:"solution_type", value:"VendorFix");
  script_tag(name:"qod_type", value:"package");

  exit(0);
}

include("revisions-lib.inc");
include("pkg-lib-deb.inc");

release = dpkg_get_ssh_release();
if(!release)
  exit(0);

res = "";
report = "";

if(release == "UBUNTU18.04 LTS") {

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.0.0-1014-oracle", ver:"5.0.0-1014.19", rls:"UBUNTU18.04 LTS"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.0.0-1033-gke", ver:"5.0.0-1033.34", rls:"UBUNTU18.04 LTS"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.0.0-1034-gcp", ver:"5.0.0-1034.35", rls:"UBUNTU18.04 LTS"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.0.0-1036-azure", ver:"5.0.0-1036.38", rls:"UBUNTU18.04 LTS"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.0.0-1047-oem-osp1", ver:"5.0.0-1047.52", rls:"UBUNTU18.04 LTS"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-azure", ver:"5.0.0.1036.47", rls:"UBUNTU18.04 LTS"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-gcp", ver:"5.0.0.1034.38", rls:"UBUNTU18.04 LTS"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-gke-5.0", ver:"5.0.0.1033.21", rls:"UBUNTU18.04 LTS"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-oem-osp1", ver:"5.0.0.1047.50", rls:"UBUNTU18.04 LTS"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-oracle", ver:"5.0.0.1014.15", rls:"UBUNTU18.04 LTS"))) {
    report += res;
  }

  if(report != "") {
    security_message(data:report);
  } else if(__pkg_match) {
    exit(99);
  }
  exit(0);
}

exit(0);

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
08 Apr 2020 00:00Current
8.2High risk
Vulners AI Score8.2
CVSS23.6
CVSS37.1
EPSS0.00208
36
.json
Report