{"id":"USN-4208-1","summary":"linux, linux-aws, linux-gcp, linux-gcp-5.3, linux-kvm, linux-oracle vulnerabilities","details":"Jann Horn discovered that the OverlayFS and ShiftFS Drivers in the Linux\nkernel did not properly handle reference counting during memory mapping\noperations when used in conjunction with AUFS. A local attacker could use\nthis to cause a denial of service (system crash) or possibly execute\narbitrary code. (CVE-2019-15794)\n\nNicolas Waisman discovered that the WiFi driver stack in the Linux kernel\ndid not properly validate SSID lengths. A physically proximate attacker\ncould use this to cause a denial of service (system crash).\n(CVE-2019-17133)\n\nIt was discovered that the ARM Komeda display driver for the Linux kernel\ndid not properly deallocate memory in certain error conditions. A local\nattacker could use this to cause a denial of service (memory exhaustion).\n(CVE-2019-18810)\n\nIt was discovered that the VirtualBox guest driver implementation in the\nLinux kernel did not properly deallocate memory in certain error\nconditions. A local attacker could use this to cause a denial of service\n(memory exhaustion). (CVE-2019-19048)\n\nIt was discovered that the ADIS16400 IIO IMU Driver for the Linux kernel\ndid not properly deallocate memory in certain error conditions. A local\nattacker could use this to cause a denial of service (memory exhaustion).\n(CVE-2019-19060, CVE-2019-19061)\n\nIt was discovered that the Intel OPA Gen1 Infiniband Driver for the Linux\nkernel did not properly deallocate memory in certain error conditions. A\nlocal attacker could use this to cause a denial of service (memory\nexhaustion). (CVE-2019-19065)\n\nIt was discovered that the AMD Audio Coprocessor driver for the Linux\nkernel did not properly deallocate memory in certain error conditions. A\nlocal attacker with the ability to load modules could use this to cause a\ndenial of service (memory exhaustion). (CVE-2019-19067)\n\nIt was discovered in the Qualcomm FastRPC Driver for the Linux kernel did\nnot properly deallocate memory in certain error conditions. A local\nattacker could use this to cause a denial of service (memory exhaustion).\n(CVE-2019-19069)\n\nIt was discovered that the Cascoda CA8210 SPI 802.15.4 wireless controller\ndriver for the Linux kernel did not properly deallocate memory in certain\nerror conditions. A local attacker could use this to cause a denial of\nservice (memory exhaustion). (CVE-2019-19075)\n\nIt was discovered that the AMD Display Engine Driver in the Linux kernel\ndid not properly deallocate memory in certain error conditions. A local\nattack could use this to cause a denial of service (memory exhaustion).\n(CVE-2019-19083)\n\nNicolas Waisman discovered that the Chelsio T4/T5 RDMA Driver for the Linux\nkernel performed DMA from a kernel stack. A local attacker could use this\nto cause a denial of service (system crash). (CVE-2019-17075)\n","modified":"2026-02-10T04:41:43Z","published":"2019-12-02T23:37:37Z","related":["UBUNTU-CVE-2019-15794","UBUNTU-CVE-2019-17075","UBUNTU-CVE-2019-17133","UBUNTU-CVE-2019-18810","UBUNTU-CVE-2019-19048","UBUNTU-CVE-2019-19060","UBUNTU-CVE-2019-19061","UBUNTU-CVE-2019-19065","UBUNTU-CVE-2019-19067","UBUNTU-CVE-2019-19069","UBUNTU-CVE-2019-19075","UBUNTU-CVE-2019-19083"],"upstream":["CVE-2019-15794","CVE-2019-17075","CVE-2019-17133","CVE-2019-18810","CVE-2019-19048","CVE-2019-19060","CVE-2019-19061","CVE-2019-19065","CVE-2019-19067","CVE-2019-19069","CVE-2019-19075","CVE-2019-19083","UBUNTU-CVE-2019-15794","UBUNTU-CVE-2019-17075","UBUNTU-CVE-2019-17133","UBUNTU-CVE-2019-18810","UBUNTU-CVE-2019-19048","UBUNTU-CVE-2019-19060","UBUNTU-CVE-2019-19061","UBUNTU-CVE-2019-19065","UBUNTU-CVE-2019-19067","UBUNTU-CVE-2019-19069","UBUNTU-CVE-2019-19075","UBUNTU-CVE-2019-19083"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-4208-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-15794"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-17075"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-17133"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-18810"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-19048"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-19060"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-19061"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-19065"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-19067"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-19069"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-19075"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-19083"}],"affected":[{"package":{"name":"linux-gcp-5.3","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/linux-gcp-5.3@5.3.0-1009.10~18.04.1?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.3.0-1009.10~18.04.1"}]}],"versions":["5.3.0-1008.9~18.04.1"],"ecosystem_specific":{"binaries":[{"binary_name":"linux-buildinfo-5.3.0-1009-gcp","binary_version":"5.3.0-1009.10~18.04.1"},{"binary_name":"linux-gcp-5.3-headers-5.3.0-1009","binary_version":"5.3.0-1009.10~18.04.1"},{"binary_name":"linux-gcp-5.3-tools-5.3.0-1009","binary_version":"5.3.0-1009.10~18.04.1"},{"binary_name":"linux-headers-5.3.0-1009-gcp","binary_version":"5.3.0-1009.10~18.04.1"},{"binary_name":"linux-image-unsigned-5.3.0-1009-gcp","binary_version":"5.3.0-1009.10~18.04.1"},{"binary_name":"linux-modules-5.3.0-1009-gcp","binary_version":"5.3.0-1009.10~18.04.1"},{"binary_name":"linux-modules-extra-5.3.0-1009-gcp","binary_version":"5.3.0-1009.10~18.04.1"},{"binary_name":"linux-tools-5.3.0-1009-gcp","binary_version":"5.3.0-1009.10~18.04.1"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4208-1.json","cves_map":{"ecosystem":"Ubuntu:18.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-15794"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"negligible"}],"id":"CVE-2019-17075"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-17133"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2019-18810"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-19048"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2019-19060"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2019-19061"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2019-19065"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2019-19067"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-19069"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2019-19075"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2019-19083"}]}}}],"schema_version":"1.7.3"}