|Category:||Debian Local Security Checks|
|Title:||Debian LTS: Security Advisory for linux-4.19 (DLA-2385-1)|
|Summary:||The remote host is missing an update for the 'linux-4.19'; package(s) announced via the DLA-2385-1 advisory.|
The remote host is missing an update for the 'linux-4.19'
package(s) announced via the DLA-2385-1 advisory.
Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service, or information
Kernel buffers allocated by the SCTP network protocol were not
limited by the memory cgroup controller. A local user could
potentially use this to evade container memory limits and to cause
a denial of service (excessive memory use).
CVE-2019-19448, CVE-2019-19813, CVE-2019-19816
'Team bobfuzzer' reported bugs in Btrfs that could lead to a
use-after-free or heap buffer overflow, and could be triggered by
crafted filesystem images. A user permitted to mount and access
arbitrary filesystems could use these to cause a denial of service
(crash or memory corruption) or possibly for privilege escalation.
Luca Bruno of Red Hat discovered that the zram control file
/sys/class/zram-control/hot_add was readable by all users. On a
system with zram enabled, a local user could use this to cause a
denial of service (memory exhaustion).
It was discovered that the PCIe Virtual Function I/O (vfio-pci)
driver allowed users to disable a device's memory space while it
was still mapped into a process. On some hardware platforms,
local users or guest virtual machines permitted to access PCIe
Virtual Functions could use this to cause a denial of service
(hardware error and crash).
A bug was discovered in the ext4 filesystem that could lead to an
out-of-bound read. A local user permitted to mount and access
arbitrary filesystem images could use this to cause a denial of
A bug was discovered in the VGA console driver's soft-scrollback
feature that could lead to a heap buffer overflow. On a system
with a custom kernel that has CONFIG_VGACON_SOFT_SCROLLBACK
enabled, a local user with access to a console could use this to
cause a denial of service (crash or memory corruption) or possibly
for privilege escalation.
A bug was discovered in the cgroup subsystem's handling of socket
references to cgroups. In some cgroup configurations, this could
lead to a use-after-free. A local user might be able to use this
to cause a denial of service (crash or memory corruption) or
possibly for privilege escalation.
A bug was discovered in XFS, which could lead to an extended
attribute (xattr) wrongly being detected as invalid. A local user
with access to an XFS filesystem could use this to cause a denial
of service (filesystem shutdown).
Or Cohen discovered a bug in the packet socket (AF_PACKET)
implementation which could lead to a heap buffer overflow. A
Description truncated. Please see the references for more information.
'linux-4.19' package(s) on Debian Linux.
For Debian 9 stretch, these problems have been fixed in version
deb9u1. This update additionally fixes Debian bugs
#966846, #966917, and #968567, and includes many more bug fixes from
stable updates 4.19.133-4.19.146 inclusive.
We recommend that you upgrade your linux-4.19 packages.
Common Vulnerability Exposure (CVE) ID: CVE-2019-3874|
RedHat Security Advisories: RHSA-2019:3309
RedHat Security Advisories: RHSA-2019:3517
|Copyright||Copyright (C) 2020 Greenbone Networks GmbH|
|This is only one of 85075 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.