First published: Tue Jul 23 2019(Updated: )
Adam Zabrocki discovered that the Intel i915 kernel mode graphics driver in the Linux kernel did not properly restrict mmap() ranges in some situations. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-11085) It was discovered that a race condition leading to a use-after-free existed in the Reliable Datagram Sockets (RDS) protocol implementation in the Linux kernel. The RDS protocol is disabled via blocklist by default in Ubuntu. If enabled, a local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-11815) It was discovered that the ext4 file system implementation in the Linux kernel did not properly zero out memory in some situations. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2019-11833) It was discovered that the Bluetooth Human Interface Device Protocol (HIDP) implementation in the Linux kernel did not properly verify strings were NULL terminated in certain situations. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2019-11884)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-4.15.0-1018-oracle | <4.15.0-1018.20 | 4.15.0-1018.20 |
=18.04 | ||
All of | ||
ubuntu/linux-image-4.15.0-1037-gcp | <4.15.0-1037.39 | 4.15.0-1037.39 |
=18.04 | ||
All of | ||
ubuntu/linux-image-4.15.0-1039-kvm | <4.15.0-1039.39 | 4.15.0-1039.39 |
=18.04 | ||
All of | ||
ubuntu/linux-image-4.15.0-1041-raspi2 | <4.15.0-1041.44 | 4.15.0-1041.44 |
=18.04 | ||
All of | ||
ubuntu/linux-image-4.15.0-1044-aws | <4.15.0-1044.46 | 4.15.0-1044.46 |
=18.04 | ||
All of | ||
ubuntu/linux-image-4.15.0-1058-snapdragon | <4.15.0-1058.64 | 4.15.0-1058.64 |
=18.04 | ||
All of | ||
ubuntu/linux-image-4.15.0-55-generic | <4.15.0-55.60 | 4.15.0-55.60 |
=18.04 | ||
All of | ||
ubuntu/linux-image-4.15.0-55-generic-lpae | <4.15.0-55.60 | 4.15.0-55.60 |
=18.04 | ||
All of | ||
ubuntu/linux-image-4.15.0-55-lowlatency | <4.15.0-55.60 | 4.15.0-55.60 |
=18.04 | ||
All of | ||
ubuntu/linux-image-aws | <4.15.0.1044.43 | 4.15.0.1044.43 |
=18.04 | ||
All of | ||
ubuntu/linux-image-gcp | <4.15.0.1037.39 | 4.15.0.1037.39 |
=18.04 | ||
All of | ||
ubuntu/linux-image-generic | <4.15.0.55.57 | 4.15.0.55.57 |
=18.04 | ||
All of | ||
ubuntu/linux-image-generic-lpae | <4.15.0.55.57 | 4.15.0.55.57 |
=18.04 | ||
All of | ||
ubuntu/linux-image-kvm | <4.15.0.1039.39 | 4.15.0.1039.39 |
=18.04 | ||
All of | ||
ubuntu/linux-image-lowlatency | <4.15.0.55.57 | 4.15.0.55.57 |
=18.04 | ||
All of | ||
ubuntu/linux-image-oracle | <4.15.0.1018.21 | 4.15.0.1018.21 |
=18.04 | ||
All of | ||
ubuntu/linux-image-raspi2 | <4.15.0.1041.39 | 4.15.0.1041.39 |
=18.04 | ||
All of | ||
ubuntu/linux-image-snapdragon | <4.15.0.1058.61 | 4.15.0.1058.61 |
=18.04 | ||
All of | ||
ubuntu/linux-image-virtual | <4.15.0.55.57 | 4.15.0.55.57 |
=18.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The vulnerability in USN-4068-1 is CVE-2019-11085, which is a kernel mode graphics driver vulnerability in the Intel i915 driver in the Linux kernel.
A local attacker can exploit CVE-2019-11085 by causing a denial of service (system crash) or possibly executing arbitrary code through the mmap() function.
The vulnerability in USN-4068-1 affects Ubuntu 18.04.
To fix the vulnerability in USN-4068-1, update your system to the specified kernel versions: linux-image-4.15.0-1018-oracle (4.15.0-1018.20), linux-image-4.15.0-1037-gcp (4.15.0-1037.39), linux-image-4.15.0-1039-kvm (4.15.0-1039.39), linux-image-4.15.0-1041-raspi2 (4.15.0-1041.44), linux-image-4.15.0-1044-aws (4.15.0-1044.46), linux-image-4.15.0-1058-snapdragon (4.15.0-1058.64), linux-image-4.15.0-55-generic (4.15.0-55.60), linux-image-4.15.0-55-generic-lpae (4.15.0-55.60), linux-image-4.15.0-55-lowlatency (4.15.0-55.60), linux-image-aws (4.15.0.1044.43), linux-image-gcp (4.15.0.1037.39), linux-image-generic (4.15.0.55.57), linux-image-generic-lpae (4.15.0.55.57), linux-image-kvm (4.15.0.1039.39), linux-image-lowlatency (4.15.0.55.57), linux-image-oracle (4.15.0.1018.21), linux-image-raspi2 (4.15.0.1041.39), linux-image-snapdragon (4.15.0.1058.61), linux-image-virtual (4.15.0.55.57).
You can find more information about USN-4068-1 and the associated vulnerabilities on the Ubuntu website.