CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
91.1%
It was discovered that a heap-based buffer overflow existed in the Marvell
WiFi-Ex Driver for the Linux kernel. A physically proximate attacker could
use this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2019-14895, CVE-2019-14901)
It was discovered that a heap-based buffer overflow existed in the Marvell
Libertas WLAN Driver for the Linux kernel. A physically proximate attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2019-14896, CVE-2019-14897)
It was discovered that the Fujitsu ES network device driver for the Linux
kernel did not properly check for errors in some situations, leading to a
NULL pointer dereference. A local attacker could use this to cause a denial
of service. (CVE-2019-16231)
It was discovered that the QLogic Fibre Channel driver in the Linux kernel
did not properly check for error, leading to a NULL pointer dereference. A
local attacker could possibly use this to cause a denial of service (system
crash). (CVE-2019-16233)
Anthony Steinhauser discovered that the Linux kernel did not properly
perform Spectre_RSB mitigations to all processors for PowerPC architecture
systems in some situations. A local attacker could use this to expose
sensitive information. (CVE-2019-18660)
It was discovered that the Mellanox Technologies Innova driver in the Linux
kernel did not properly deallocate memory in certain failure conditions. A
local attacker could use this to cause a denial of service (kernel memory
exhaustion). (CVE-2019-19045)
It was discovered that Geschwister Schneider USB CAN interface driver in
the Linux kernel did not properly deallocate memory in certain failure
conditions. A physically proximate attacker could use this to cause a
denial of service (kernel memory exhaustion). (CVE-2019-19052)
It was discovered that the AMD Display Engine Driver in the Linux kernel
did not properly deallocate memory in certain error conditions. A local
attack could use this to cause a denial of service (memory exhaustion).
(CVE-2019-19083)
It was discovered that the driver for memoryless force-feedback input
devices in the Linux kernel contained a use-after-free vulnerability. A
physically proximate attacker could possibly use this to cause a denial of
service (system crash) or execute arbitrary code. (CVE-2019-19524)
It was discovered that the Microchip CAN BUS Analyzer driver in the Linux
kernel contained a use-after-free vulnerability on device disconnect. A
physically proximate attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2019-19529)
It was discovered that the PEAK-System Technik USB driver in the Linux
kernel did not properly sanitize memory before sending it to the device. A
physically proximate attacker could use this to expose sensitive
information (kernel memory). (CVE-2019-19534)
Tristan Madani discovered that the ALSA timer implementation in the Linux
kernel contained a use-after-free vulnerability. A local attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2019-19807)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 18.04 | noarch | linux-image-4.15.0-1031-oracle | < 4.15.0-1031.34 | UNKNOWN |
Ubuntu | 18.04 | noarch | linux-image-4.15.0-1031-oracle-dbgsym | < 4.15.0-1031.34 | UNKNOWN |
Ubuntu | 18.04 | noarch | linux-image-4.15.0-1050-gke | < 4.15.0-1050.53 | UNKNOWN |
Ubuntu | 18.04 | noarch | linux-image-4.15.0-1050-gke-dbgsym | < 4.15.0-1050.53 | UNKNOWN |
Ubuntu | 18.04 | noarch | linux-image-4.15.0-1052-kvm | < 4.15.0-1052.52 | UNKNOWN |
Ubuntu | 18.04 | noarch | linux-buildinfo-4.15.0-1052-kvm | < 4.15.0-1052.52 | UNKNOWN |
Ubuntu | 18.04 | noarch | linux-headers-4.15.0-1052-kvm | < 4.15.0-1052.52 | UNKNOWN |
Ubuntu | 18.04 | noarch | linux-image-4.15.0-1052-kvm-dbgsym | < 4.15.0-1052.52 | UNKNOWN |
Ubuntu | 18.04 | noarch | linux-kvm-headers-4.15.0-1052 | < 4.15.0-1052.52 | UNKNOWN |
Ubuntu | 18.04 | noarch | linux-kvm-tools-4.15.0-1052 | < 4.15.0-1052.52 | UNKNOWN |
ubuntu.com/security/CVE-2019-14895
ubuntu.com/security/CVE-2019-14896
ubuntu.com/security/CVE-2019-14897
ubuntu.com/security/CVE-2019-14901
ubuntu.com/security/CVE-2019-16231
ubuntu.com/security/CVE-2019-16233
ubuntu.com/security/CVE-2019-18660
ubuntu.com/security/CVE-2019-19045
ubuntu.com/security/CVE-2019-19052
ubuntu.com/security/CVE-2019-19083
ubuntu.com/security/CVE-2019-19524
ubuntu.com/security/CVE-2019-19529
ubuntu.com/security/CVE-2019-19534
ubuntu.com/security/CVE-2019-19807
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
91.1%