{"id":"USN-4185-2","summary":"linux-azure vulnerabilities","details":"Stephan van Schaik, Alyssa Milburn, Sebastian Österlund, Pietro Frigo,\nKaveh Razavi, Herbert Bos, Cristiano Giuffrida, Giorgi Maisuradze, Moritz\nLipp, Michael Schwarz, Daniel Gruss, and Jo Van Bulck discovered that Intel\nprocessors using Transactional Synchronization Extensions (TSX) could\nexpose memory contents previously stored in microarchitectural buffers to a\nmalicious process that is executing on the same CPU core. A local attacker\ncould use this to expose sensitive information. (CVE-2019-11135)\n\nDeepak Gupta discovered that on certain Intel processors, the Linux kernel\ndid not properly perform invalidation on page table updates by virtual\nguest operating systems. A local attacker in a guest VM could use this to\ncause a denial of service (host system crash). (CVE-2018-12207)\n\nOri Nimron discovered that the AX25 network protocol implementation in the\nLinux kernel did not properly perform permissions checks. A local attacker\ncould use this to create a raw socket. (CVE-2019-17052)\n\nOri Nimron discovered that the IEEE 802.15.4 Low-Rate Wireless network\nprotocol implementation in the Linux kernel did not properly perform\npermissions checks. A local attacker could use this to create a raw socket.\n(CVE-2019-17053)\n\nOri Nimron discovered that the Appletalk network protocol implementation in\nthe Linux kernel did not properly perform permissions checks. A local\nattacker could use this to create a raw socket. (CVE-2019-17054)\n\nOri Nimron discovered that the modular ISDN network protocol implementation\nin the Linux kernel did not properly perform permissions checks. A local\nattacker could use this to create a raw socket. (CVE-2019-17055)\n\nOri Nimron discovered that the Near field Communication (NFC) network\nprotocol implementation in the Linux kernel did not properly perform\npermissions checks. A local attacker could use this to create a raw socket.\n(CVE-2019-17056)\n","modified":"2026-04-27T15:32:32.921093Z","published":"2019-11-13T01:58:50Z","related":["UBUNTU-CVE-2018-12207","UBUNTU-CVE-2019-11135","UBUNTU-CVE-2019-17052","UBUNTU-CVE-2019-17053","UBUNTU-CVE-2019-17054","UBUNTU-CVE-2019-17055","UBUNTU-CVE-2019-17056"],"upstream":["CVE-2018-12207","CVE-2019-11135","CVE-2019-17052","CVE-2019-17053","CVE-2019-17054","CVE-2019-17055","CVE-2019-17056","UBUNTU-CVE-2018-12207","UBUNTU-CVE-2019-11135","UBUNTU-CVE-2019-17052","UBUNTU-CVE-2019-17053","UBUNTU-CVE-2019-17054","UBUNTU-CVE-2019-17055","UBUNTU-CVE-2019-17056"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-4185-2"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-12207"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-11135"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-17052"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-17053"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-17054"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-17055"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-17056"}],"affected":[{"package":{"name":"linux-azure","ecosystem":"Ubuntu:Pro:14.04:LTS","purl":"pkg:deb/ubuntu/linux-azure@4.15.0-1063.68~14.04.1?arch=source&distro=trusty/esm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.15.0-1063.68~14.04.1"}]}],"versions":["4.15.0-1023.24~14.04.1","4.15.0-1030.31~14.04.1","4.15.0-1031.32~14.04.1","4.15.0-1032.33~14.04.2","4.15.0-1035.36~14.04.2","4.15.0-1036.38~14.04.2","4.15.0-1037.39~14.04.2","4.15.0-1039.41~14.04.2","4.15.0-1040.44~14.04.1","4.15.0-1041.45~14.04.1","4.15.0-1042.46~14.04.1","4.15.0-1045.49~14.04.1","4.15.0-1046.50~14.04.1","4.15.0-1047.51~14.04.1","4.15.0-1049.54~14.04.1","4.15.0-1050.55~14.04.1","4.15.0-1051.56~14.04.1","4.15.0-1052.57~14.04.1","4.15.0-1055.60~14.04.1","4.15.0-1056.61~14.04.1","4.15.0-1057.62~14.04.1","4.15.0-1059.64~14.04.1","4.15.0-1060.65~14.04.1","4.15.0-1061.66~14.04.1"],"ecosystem_specific":{"binaries":[{"binary_version":"4.15.0-1063.68~14.04.1","binary_name":"linux-azure-cloud-tools-4.15.0-1063"},{"binary_version":"4.15.0-1063.68~14.04.1","binary_name":"linux-azure-headers-4.15.0-1063"},{"binary_version":"4.15.0-1063.68~14.04.1","binary_name":"linux-azure-tools-4.15.0-1063"},{"binary_version":"4.15.0-1063.68~14.04.1","binary_name":"linux-buildinfo-4.15.0-1063-azure"},{"binary_version":"4.15.0-1063.68~14.04.1","binary_name":"linux-cloud-tools-4.15.0-1063-azure"},{"binary_version":"4.15.0-1063.68~14.04.1","binary_name":"linux-headers-4.15.0-1063-azure"},{"binary_version":"4.15.0-1063.68~14.04.1","binary_name":"linux-image-unsigned-4.15.0-1063-azure"},{"binary_version":"4.15.0-1063.68~14.04.1","binary_name":"linux-modules-4.15.0-1063-azure"},{"binary_version":"4.15.0-1063.68~14.04.1","binary_name":"linux-modules-extra-4.15.0-1063-azure"},{"binary_version":"4.15.0-1063.68~14.04.1","binary_name":"linux-tools-4.15.0-1063-azure"}],"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4185-2.json","cves_map":{"ecosystem":"Ubuntu:Pro:14.04:LTS","cves":[{"id":"CVE-2018-12207","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}]},{"id":"CVE-2019-11135","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}]},{"id":"CVE-2019-17052","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2019-17053","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2019-17054","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2019-17055","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2019-17056","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}]}}}],"schema_version":"1.7.5"}