9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
8.6 High
AI Score
Confidence
High
7.8 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:N/I:N/A:C
0.048 Low
EPSS
Percentile
92.6%
It was discovered that a buffer overflow existed in the 802.11 Wi-Fi
configuration interface for the Linux kernel when handling beacon settings.
A local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2019-16746)
Nicolas Waisman discovered that the WiFi driver stack in the Linux kernel
did not properly validate SSID lengths. A physically proximate attacker
could use this to cause a denial of service (system crash).
(CVE-2019-17133)
It was discovered that the ADIS16400 IIO IMU Driver for the Linux kernel
did not properly deallocate memory in certain error conditions. A local
attacker could use this to cause a denial of service (memory exhaustion).
(CVE-2019-19060)
It was discovered that the Intel OPA Gen1 Infiniband Driver for the Linux
kernel did not properly deallocate memory in certain error conditions. A
local attacker could use this to cause a denial of service (memory
exhaustion). (CVE-2019-19065)
It was discovered that the Cascoda CA8210 SPI 802.15.4 wireless controller
driver for the Linux kernel did not properly deallocate memory in certain
error conditions. A local attacker could use this to cause a denial of
service (memory exhaustion). (CVE-2019-19075)
Nicolas Waisman discovered that the Chelsio T4/T5 RDMA Driver for the Linux
kernel performed DMA from a kernel stack. A local attacker could use this
to cause a denial of service (system crash). (CVE-2019-17075)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 18.04 | noarch | linux-image-4.15.0-1030-oracle | < 4.15.0-1030.33 | UNKNOWN |
Ubuntu | 18.04 | noarch | linux-image-4.15.0-1030-oracle-dbgsym | < 4.15.0-1030.33 | UNKNOWN |
Ubuntu | 18.04 | noarch | linux-image-4.15.0-1049-gke | < 4.15.0-1049.52 | UNKNOWN |
Ubuntu | 18.04 | noarch | linux-image-4.15.0-1049-gke-dbgsym | < 4.15.0-1049.52 | UNKNOWN |
Ubuntu | 18.04 | noarch | linux-image-4.15.0-1051-kvm | < 4.15.0-1051.51 | UNKNOWN |
Ubuntu | 18.04 | noarch | linux-buildinfo-4.15.0-1051-kvm | < 4.15.0-1051.51 | UNKNOWN |
Ubuntu | 18.04 | noarch | linux-headers-4.15.0-1051-kvm | < 4.15.0-1051.51 | UNKNOWN |
Ubuntu | 18.04 | noarch | linux-image-4.15.0-1051-kvm-dbgsym | < 4.15.0-1051.51 | UNKNOWN |
Ubuntu | 18.04 | noarch | linux-kvm-headers-4.15.0-1051 | < 4.15.0-1051.51 | UNKNOWN |
Ubuntu | 18.04 | noarch | linux-kvm-tools-4.15.0-1051 | < 4.15.0-1051.51 | UNKNOWN |
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
8.6 High
AI Score
Confidence
High
7.8 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:N/I:N/A:C
0.048 Low
EPSS
Percentile
92.6%