8.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
8.3 High
AI Score
Confidence
High
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.005 Low
EPSS
Percentile
76.8%
USN-4068-1 fixed vulnerabilities in the Linux kernel for Ubuntu
18.04 LTS. This update provides the corresponding updates for the
Linux Hardware Enablement (HWE) kernel from Ubuntu 18.04 for Ubuntu
16.04 LTS.
Adam Zabrocki discovered that the Intel i915 kernel mode graphics driver in
the Linux kernel did not properly restrict mmap() ranges in some
situations. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2019-11085)
It was discovered that a race condition leading to a use-after-free existed
in the Reliable Datagram Sockets (RDS) protocol implementation in the Linux
kernel. The RDS protocol is disabled via blocklist by default in Ubuntu.
If enabled, a local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2019-11815)
It was discovered that the ext4 file system implementation in the Linux
kernel did not properly zero out memory in some situations. A local
attacker could use this to expose sensitive information (kernel memory).
(CVE-2019-11833)
It was discovered that the Bluetooth Human Interface Device Protocol (HIDP)
implementation in the Linux kernel did not properly verify strings were
NULL terminated in certain situations. A local attacker could use this to
expose sensitive information (kernel memory). (CVE-2019-11884)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 16.04 | noarch | linux-image-4.15.0-1037-gcp | <Ā 4.15.0-1037.39~16.04.1 | UNKNOWN |
Ubuntu | 16.04 | noarch | linux-image-4.15.0-1037-gcp-dbgsym | <Ā 4.15.0-1037.39~16.04.1 | UNKNOWN |
Ubuntu | 16.04 | noarch | linux-image-4.15.0-55-generic | <Ā 4.15.0-55.60~16.04.2 | UNKNOWN |
Ubuntu | 16.04 | noarch | kernel-signed-image-4.15.0-55-generic-di | <Ā 4.15.0-55.60~16.04.2 | UNKNOWN |
Ubuntu | 16.04 | noarch | kernel-signed-image-4.15.0-55-generic-di-dbgsym | <Ā 4.15.0-55.60~16.04.2 | UNKNOWN |
Ubuntu | 16.04 | noarch | linux-image-4.15.0-55-generic-dbgsym | <Ā 4.15.0-55.60~16.04.2 | UNKNOWN |
Ubuntu | 16.04 | noarch | linux-image-4.15.0-55-lowlatency | <Ā 4.15.0-55.60~16.04.2 | UNKNOWN |
Ubuntu | 16.04 | noarch | linux-image-4.15.0-55-lowlatency-dbgsym | <Ā 4.15.0-55.60~16.04.2 | UNKNOWN |
Ubuntu | 16.04 | noarch | linux-image-4.15.0-55-generic-lpae | <Ā 4.15.0-55.60~16.04.2 | UNKNOWN |
Ubuntu | 16.04 | noarch | block-modules-4.15.0-55-generic-di | <Ā 4.15.0-55.60~16.04.2 | UNKNOWN |
8.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
8.3 High
AI Score
Confidence
High
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.005 Low
EPSS
Percentile
76.8%