Oval Definition:oval:com.ubuntu.bionic:def:201995030000000
Revision Date:2020-01-16Version:1
Title:CVE-2019-9503 on Ubuntu 18.04 LTS (bionic) - medium.
Description:The Broadcom brcmfmac WiFi driver prior to commit a4176ec356c73a46c07c181c6d04039fafa34a9f is vulnerable to a frame validation bypass. If the brcmfmac driver receives a firmware event frame from a remote source, the is_wlc_event_frame function will cause this frame to be discarded and unprocessed. If the driver receives the firmware event frame from the host, the appropriate handler is called. This frame validation can be bypassed if the bus used is USB (for instance by a wifi dongle). This can allow firmware event frames from a remote source to be processed. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions. Hugues Anguelkov discovered that the Broadcom Wifi driver in the Linux kernel did not properly prevent remote firmware events from being processed for USB Wifi devices. A physically proximate attacker could use this to send firmware events to the device.
Family:unixClass:vulnerability
Status:Reference(s):CVE-2019-9503
Platform(s):Ubuntu 18.04 LTS
Product(s):
Definition Synopsis
  • Ubuntu 18.04 LTS (bionic) is installed.
  • AND Package Information
  • linux package in bionic was vulnerable but has been fixed (note: '4.15.0-50.54').
  • OR linux-aws package in bionic was vulnerable but has been fixed (note: '4.15.0-1039.41').
  • OR linux-azure package in bionic was vulnerable but has been fixed (note: '4.18.0-1018.18~18.04.1').
  • OR linux-gcp package in bionic was vulnerable but has been fixed (note: '4.15.0-1032.34').
  • OR linux-gke-4.15 package in bionic was vulnerable but has been fixed (note: '4.15.0-1032.34').
  • OR linux-gke-5.0 package in bionic, is related to the CVE in some way and has been fixed (note: '5.0.0-1011.11~18.04.1').
  • OR linux-hwe package in bionic was vulnerable but has been fixed (note: '4.18.0-20.21~18.04.1').
  • OR linux-kvm package in bionic was vulnerable but has been fixed (note: '4.15.0-1034.34').
  • OR linux-meta package in bionic was vulnerable but has been fixed (note: '4.15.0-50.54').
  • OR linux-meta-aws package in bionic was vulnerable but has been fixed (note: '4.15.0-1039.41').
  • OR linux-meta-azure package in bionic was vulnerable but has been fixed (note: '4.18.0-1018.18~18.04.1').
  • OR linux-meta-gcp package in bionic was vulnerable but has been fixed (note: '4.15.0-1032.34').
  • OR linux-meta-gke-4.15 package in bionic was vulnerable but has been fixed (note: '4.15.0-1032.34').
  • OR linux-meta-gke-5.0 package in bionic, is related to the CVE in some way and has been fixed (note: '5.0.0-1011.11~18.04.1').
  • OR linux-meta-hwe package in bionic was vulnerable but has been fixed (note: '4.18.0-20.21~18.04.1').
  • OR linux-meta-kvm package in bionic was vulnerable but has been fixed (note: '4.15.0-1034.34').
  • OR linux-meta-oem package in bionic was vulnerable but has been fixed (note: '4.15.0-1038.43').
  • OR linux-meta-oracle package in bionic was vulnerable but has been fixed (note: '4.15.0-1013.15').
  • OR linux-meta-raspi2 package in bionic was vulnerable but has been fixed (note: '4.15.0-1036.38').
  • OR linux-meta-snapdragon package in bionic was vulnerable but has been fixed (note: '4.15.0-1053.57').
  • OR linux-oem package in bionic was vulnerable but has been fixed (note: '4.15.0-1038.43').
  • OR linux-oracle package in bionic was vulnerable but has been fixed (note: '4.15.0-1013.15').
  • OR linux-raspi2 package in bionic was vulnerable but has been fixed (note: '4.15.0-1036.38').
  • OR linux-signed package in bionic was vulnerable but has been fixed (note: '4.15.0-50.54').
  • OR linux-signed-azure package in bionic was vulnerable but has been fixed (note: '4.18.0-1018.18~18.04.1').
  • OR linux-signed-gcp package in bionic was vulnerable but has been fixed (note: '4.15.0-1032.34').
  • OR linux-signed-gke-4.15 package in bionic was vulnerable but has been fixed (note: '4.15.0-1032.34').
  • OR linux-signed-gke-5.0 package in bionic, is related to the CVE in some way and has been fixed (note: '5.0.0-1011.11~18.04.1').
  • OR linux-signed-hwe package in bionic was vulnerable but has been fixed (note: '4.18.0-20.21~18.04.1').
  • OR linux-signed-oem package in bionic was vulnerable but has been fixed (note: '4.15.0-1038.43').
  • OR linux-signed-oracle package in bionic was vulnerable but has been fixed (note: '4.15.0-1013.15').
  • OR linux-snapdragon package in bionic was vulnerable but has been fixed (note: '4.15.0-1053.57').
  • BACK