Revision Date: | 2019-01-25 | Version: | 1 | Title: | CVE-2019-3819 on Ubuntu 19.04 (disco) - negligible. | Description: | A flaw was found in the Linux kernel in the function hid_debug_events_read() in drivers/hid/hid-debug.c file which may enter an infinite loop with certain parameters passed from a userspace. A local privileged user ("root") can cause a system lock up and a denial of service. Versions from v4.18 and newer are vulnerable. Vladis Dronov discovered that the debug interface for the Linux kernel's HID subsystem did not properly validate passed parameters in some situations. A local privileged attacker could use this to cause a denial of service (infinite loop).
| Family: | unix | Class: | vulnerability | Status: | | Reference(s): | CVE-2019-3819
| Platform(s): | Ubuntu 19.04
| Product(s): | | Definition Synopsis | Ubuntu 19.04 (disco) is installed. AND Package Information
linux package in disco, is related to the CVE in some way and has been fixed (note: '5.0.0-7.8').
OR linux-aws package in disco, is related to the CVE in some way and has been fixed (note: '5.0.0-1001.1').
OR linux-azure package in disco, is related to the CVE in some way and has been fixed (note: '5.0.0-1001.1').
OR linux-gcp package in disco, is related to the CVE in some way and has been fixed (note: '5.0.0-1001.1').
OR linux-kvm package in disco, is related to the CVE in some way and has been fixed (note: '5.0.0-1001.1').
OR linux-meta package in disco, is related to the CVE in some way and has been fixed (note: '5.0.0-7.8').
OR linux-meta-aws package in disco, is related to the CVE in some way and has been fixed (note: '5.0.0-1001.1').
OR linux-meta-azure package in disco, is related to the CVE in some way and has been fixed (note: '5.0.0-1001.1').
OR linux-meta-gcp package in disco, is related to the CVE in some way and has been fixed (note: '5.0.0-1001.1').
OR linux-meta-kvm package in disco, is related to the CVE in some way and has been fixed (note: '5.0.0-1001.1').
OR linux-meta-oem package in disco is affected. An update containing the fix has been completed and is pending publication (note: '4.15.0-1056.65').
OR linux-meta-oem-osp1 package in disco, is related to the CVE in some way and has been fixed (note: '5.0.0-1010.11').
OR linux-meta-oracle package in disco was vulnerable but has been fixed (note: '5.0.0-1004.8').
OR linux-meta-raspi2 package in disco, is related to the CVE in some way and has been fixed (note: '5.0.0-1004.4').
OR linux-oem package in disco is affected. An update containing the fix has been completed and is pending publication (note: '4.15.0-1056.65').
OR linux-oem-osp1 package in disco, is related to the CVE in some way and has been fixed (note: '5.0.0-1010.11').
OR linux-oracle package in disco was vulnerable but has been fixed (note: '5.0.0-1004.8').
OR linux-raspi2 package in disco, is related to the CVE in some way and has been fixed (note: '5.0.0-1004.4').
OR linux-signed package in disco, is related to the CVE in some way and has been fixed (note: '5.0.0-7.8').
OR linux-signed-azure package in disco, is related to the CVE in some way and has been fixed (note: '5.0.0-1001.1').
OR linux-signed-gcp package in disco, is related to the CVE in some way and has been fixed (note: '5.0.0-1001.1').
OR linux-signed-oem package in disco is affected. An update containing the fix has been completed and is pending publication (note: '4.15.0-1056.65').
OR linux-signed-oem-osp1 package in disco, is related to the CVE in some way and has been fixed (note: '5.0.0-1010.11').
OR linux-signed-oracle package in disco was vulnerable but has been fixed (note: '5.0.0-1004.8').
OR linux-snapdragon package in disco, is related to the CVE in some way and has been fixed (note: '5.0.0-1010.10').
|
|