{"id":"USN-4162-2","summary":"linux-azure vulnerabilities","details":"USN-4162-1 fixed vulnerabilities in the Linux kernel for Ubuntu 18.04\nLTS. This update provides the corresponding updates for the Linux\nkernel for Microsoft Azure Cloud systems for Ubuntu 14.04 ESM.\n\nIt was discovered that the RSI 91x Wi-Fi driver in the Linux kernel did not\ndid not handle detach operations correctly, leading to a use-after-free\nvulnerability. A physically proximate attacker could use this to cause a\ndenial of service (system crash) or possibly execute arbitrary code.\n(CVE-2018-21008)\n\nWen Huang discovered that the Marvell Wi-Fi device driver in the Linux\nkernel did not properly perform bounds checking, leading to a heap\noverflow. A local attacker could use this to cause a denial of service\n(system crash) or possibly execute arbitrary code. (CVE-2019-14814,\nCVE-2019-14815, CVE-2019-14816)\n\nMatt Delco discovered that the KVM hypervisor implementation in the Linux\nkernel did not properly perform bounds checking when handling coalesced\nMMIO write operations. A local attacker with write access to /dev/kvm could\nuse this to cause a denial of service (system crash). (CVE-2019-14821)\n\nHui Peng and Mathias Payer discovered that the USB audio driver for the\nLinux kernel did not properly validate device meta data. A physically\nproximate attacker could use this to cause a denial of service (system\ncrash). (CVE-2019-15117)\n\nHui Peng and Mathias Payer discovered that the USB audio driver for the\nLinux kernel improperly performed recursion while handling device meta\ndata. A physically proximate attacker could use this to cause a denial of\nservice (system crash). (CVE-2019-15118)\n\nIt was discovered that the Technisat DVB-S/S2 USB device driver in the\nLinux kernel contained a buffer overread. A physically proximate attacker\ncould use this to cause a denial of service (system crash) or possibly\nexpose sensitive information. (CVE-2019-15505)\n\nBrad Spengler discovered that a Spectre mitigation was improperly\nimplemented in the ptrace susbsystem of the Linux kernel. A local attacker\ncould possibly use this to expose sensitive information. (CVE-2019-15902)\n\nIt was discovered that the SMB networking file system implementation in the\nLinux kernel contained a buffer overread. An attacker could use this to\nexpose sensitive information (kernel memory). (CVE-2019-15918)\n","modified":"2026-02-10T04:41:40Z","published":"2019-10-23T04:54:45Z","related":["UBUNTU-CVE-2018-21008","UBUNTU-CVE-2019-14814","UBUNTU-CVE-2019-14815","UBUNTU-CVE-2019-14816","UBUNTU-CVE-2019-14821","UBUNTU-CVE-2019-15117","UBUNTU-CVE-2019-15118","UBUNTU-CVE-2019-15505","UBUNTU-CVE-2019-15902","UBUNTU-CVE-2019-15918"],"upstream":["CVE-2018-21008","CVE-2019-14814","CVE-2019-14815","CVE-2019-14816","CVE-2019-14821","CVE-2019-15117","CVE-2019-15118","CVE-2019-15505","CVE-2019-15902","CVE-2019-15918","UBUNTU-CVE-2018-21008","UBUNTU-CVE-2019-14814","UBUNTU-CVE-2019-14815","UBUNTU-CVE-2019-14816","UBUNTU-CVE-2019-14821","UBUNTU-CVE-2019-15117","UBUNTU-CVE-2019-15118","UBUNTU-CVE-2019-15505","UBUNTU-CVE-2019-15902","UBUNTU-CVE-2019-15918"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-4162-2"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-21008"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-14814"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-14815"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-14816"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-14821"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-15117"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-15118"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-15505"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-15902"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-15918"}],"affected":[{"package":{"name":"linux-azure","ecosystem":"Ubuntu:Pro:14.04:LTS","purl":"pkg:deb/ubuntu/linux-azure@4.15.0-1061.66~14.04.1?arch=source&distro=trusty/esm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.15.0-1061.66~14.04.1"}]}],"versions":["4.15.0-1023.24~14.04.1","4.15.0-1030.31~14.04.1","4.15.0-1031.32~14.04.1","4.15.0-1032.33~14.04.2","4.15.0-1035.36~14.04.2","4.15.0-1036.38~14.04.2","4.15.0-1037.39~14.04.2","4.15.0-1039.41~14.04.2","4.15.0-1040.44~14.04.1","4.15.0-1041.45~14.04.1","4.15.0-1042.46~14.04.1","4.15.0-1045.49~14.04.1","4.15.0-1046.50~14.04.1","4.15.0-1047.51~14.04.1","4.15.0-1049.54~14.04.1","4.15.0-1050.55~14.04.1","4.15.0-1051.56~14.04.1","4.15.0-1052.57~14.04.1","4.15.0-1055.60~14.04.1","4.15.0-1056.61~14.04.1","4.15.0-1057.62~14.04.1","4.15.0-1059.64~14.04.1","4.15.0-1060.65~14.04.1"],"ecosystem_specific":{"binaries":[{"binary_name":"linux-azure-cloud-tools-4.15.0-1061","binary_version":"4.15.0-1061.66~14.04.1"},{"binary_name":"linux-azure-headers-4.15.0-1061","binary_version":"4.15.0-1061.66~14.04.1"},{"binary_name":"linux-azure-tools-4.15.0-1061","binary_version":"4.15.0-1061.66~14.04.1"},{"binary_name":"linux-buildinfo-4.15.0-1061-azure","binary_version":"4.15.0-1061.66~14.04.1"},{"binary_name":"linux-cloud-tools-4.15.0-1061-azure","binary_version":"4.15.0-1061.66~14.04.1"},{"binary_name":"linux-headers-4.15.0-1061-azure","binary_version":"4.15.0-1061.66~14.04.1"},{"binary_name":"linux-image-unsigned-4.15.0-1061-azure","binary_version":"4.15.0-1061.66~14.04.1"},{"binary_name":"linux-modules-4.15.0-1061-azure","binary_version":"4.15.0-1061.66~14.04.1"},{"binary_name":"linux-modules-extra-4.15.0-1061-azure","binary_version":"4.15.0-1061.66~14.04.1"},{"binary_name":"linux-tools-4.15.0-1061-azure","binary_version":"4.15.0-1061.66~14.04.1"}],"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4162-2.json","cves_map":{"cves":[{"id":"CVE-2018-21008","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2019-14814","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2019-14815","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2019-14816","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2019-14821","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2019-15117","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2019-15118","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2019-15505","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2019-15902","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2019-15918","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]}],"ecosystem":"Ubuntu:Pro:14.04:LTS"}}}],"schema_version":"1.7.3"}