Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.892483
Category:Debian Local Security Checks
Title:Debian: Security Advisory (DLA-2483-1)
Summary:The remote host is missing an update for the Debian 'linux-4.19' package(s) announced via the DLA-2483-1 advisory.
Description:Summary:
The remote host is missing an update for the Debian 'linux-4.19' package(s) announced via the DLA-2483-1 advisory.

Vulnerability Insight:
Several vulnerabilities have been discovered in the Linux kernel that may lead to the execution of arbitrary code, privilege escalation, denial of service or information leaks.

CVE-2019-19039

Team bobfuzzer reported a bug in Btrfs that could lead to an assertion failure (WARN). A user permitted to mount and access arbitrary filesystems could use this to cause a denial of service (crash) if the panic_on_warn kernel parameter is set.

CVE-2019-19377

Team bobfuzzer reported a bug in Btrfs that could lead to a use-after-free. A user permitted to mount and access arbitrary filesystems could use this to cause a denial of service (crash or memory corruption) or possibly for privilege escalation.

CVE-2019-19770

The syzbot tool discovered a race condition in the block I/O tracer (blktrace) that could lead to a system crash. Since blktrace can only be controlled by privileged users, the security impact of this is unclear.

CVE-2019-19816

Team bobfuzzer reported a bug in Btrfs that could lead to an out-of-bounds write. A user permitted to mount and access arbitrary filesystems could use this to cause a denial of service (crash or memory corruption) or possibly for privilege escalation.

CVE-2020-0423

A race condition was discovered in the Android binder driver, that could result in a use-after-free. On systems using this driver, a local user could use this to cause a denial of service (crash or memory corruption) or possibly for privilege escalation.

CVE-2020-8694

Multiple researchers discovered that the powercap subsystem allowed all users to read CPU energy meters, by default. On systems using Intel CPUs, this provided a side channel that could leak sensitive information between user processes, or from the kernel to user processes. The energy meters are now readable only by root, by default.

This issue can be mitigated by running:

chmod go-r /sys/devices/virtual/powercap/*/*/energy_uj

This needs to be repeated each time the system is booted with an unfixed kernel version.

CVE-2020-14351

A race condition was discovered in the performance events subsystem, which could lead to a use-after-free. A local user permitted to access performance events could use this to cause a denial of service (crash or memory corruption) or possibly for privilege escalation.

Debian's kernel configuration does not allow unprivileged users to access performance events by default, which fully mitigates this issue.

CVE-2020-25656

Yuan Ming and Bodong Zhao discovered a race condition in the virtual terminal (vt) driver that could lead to a use-after-free. A local user with the CAP_SYS_TTY_CONFIG capability could use this to cause a denial of service (crash or memory corruption) or possibly for privilege escalation.

CVE-2020-25668

Yuan Ming and Bodong Zhao discovered a race condition in the virtual terminal (vt) driver that could lead to a use-after-free. A local user with access to a ... [Please see the references for more information on the vulnerabilities]

Affected Software/OS:
'linux-4.19' package(s) on Debian 9.

Solution:
Please install the updated package(s).

CVSS Score:
9.3

CVSS Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2019-19039
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19039
https://lists.debian.org/debian-lts-announce/2020/12/msg00015.html
https://usn.ubuntu.com/4414-1/
Common Vulnerability Exposure (CVE) ID: CVE-2019-19377
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19377
https://usn.ubuntu.com/4367-1/
https://usn.ubuntu.com/4369-1/
Common Vulnerability Exposure (CVE) ID: CVE-2019-19770
https://bugzilla.kernel.org/show_bug.cgi?id=205713
https://lore.kernel.org/linux-block/20200402000002.7442-1-mcgrof@kernel.org/
SuSE Security Announcement: openSUSE-SU-2020:0543 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00035.html
Common Vulnerability Exposure (CVE) ID: CVE-2019-19816
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19816
https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html
Common Vulnerability Exposure (CVE) ID: CVE-2020-0423
https://source.android.com/security/bulletin/2020-10-01
Common Vulnerability Exposure (CVE) ID: CVE-2020-14351
https://bugzilla.redhat.com/show_bug.cgi?id=1862849
https://lists.debian.org/debian-lts-announce/2020/12/msg00027.html
Common Vulnerability Exposure (CVE) ID: CVE-2020-25656
https://www.starwindsoftware.com/security/sw-20210325-0006/
https://bugzilla.redhat.com/show_bug.cgi?id=1888726
https://lkml.org/lkml/2020/10/16/84
https://lkml.org/lkml/2020/10/29/528
Common Vulnerability Exposure (CVE) ID: CVE-2020-25668
https://bugzilla.redhat.com/show_bug.cgi?id=1893287,
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=90bfdeef83f1d6c696039b6a917190dcbbad3220
https://www.openwall.com/lists/oss-security/2020/10/30/1,
https://www.openwall.com/lists/oss-security/2020/11/04/3,
http://www.openwall.com/lists/oss-security/2020/10/30/1
http://www.openwall.com/lists/oss-security/2020/11/04/3
Common Vulnerability Exposure (CVE) ID: CVE-2020-25669
https://github.com/torvalds/linux/commit/77e70d351db7de07a46ac49b87a6c3c7a60fca7e
https://www.openwall.com/lists/oss-security/2020/11/05/2,
https://www.openwall.com/lists/oss-security/2020/11/20/5,
http://www.openwall.com/lists/oss-security/2020/11/05/2
http://www.openwall.com/lists/oss-security/2020/11/20/5
Common Vulnerability Exposure (CVE) ID: CVE-2020-25704
https://www.starwindsoftware.com/security/sw-20220802-0003/
https://bugzilla.redhat.com/show_bug.cgi?id=1895961
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7bdb157cdebbf95a1cd94ed2e01b338714075d00
https://www.openwall.com/lists/oss-security/2020/11/09/1
Common Vulnerability Exposure (CVE) ID: CVE-2020-25705
https://us-cert.cisa.gov/ics/advisories/icsa-21-131-03
Common Vulnerability Exposure (CVE) ID: CVE-2020-27673
https://security.gentoo.org/glsa/202011-06
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e99502f76271d6bc4e374fe368c50c67a1fd3070
https://github.com/torvalds/linux/commit/e99502f76271d6bc4e374fe368c50c67a1fd3070
https://xenbits.xen.org/xsa/advisory-332.html
http://www.openwall.com/lists/oss-security/2021/01/19/6
SuSE Security Announcement: openSUSE-SU-2020:1783 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00075.html
SuSE Security Announcement: openSUSE-SU-2020:1844 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00025.html
Common Vulnerability Exposure (CVE) ID: CVE-2020-27675
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6USZ4APZSBQDHGJLJMHW5JBN4QZV6SKZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3ZG6TZLD23QO3PV2AN2HB625ZX47ALTT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNF2R7FUT4IOJ2RIRGQ7X5R4F4FVVLSR/
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=073d0552ead5bfc7a3a9c01de590e924f11b5dd2
https://github.com/torvalds/linux/commit/073d0552ead5bfc7a3a9c01de590e924f11b5dd2
https://xenbits.xen.org/xsa/advisory-331.html
http://www.openwall.com/lists/oss-security/2021/01/19/3
Common Vulnerability Exposure (CVE) ID: CVE-2020-27777
https://bugzilla.redhat.com/show_bug.cgi?id=1900844
https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/commit/?h=next&id=bd59380c5ba4147dcbaad3e582b55ccfd120b764
https://www.openwall.com/lists/oss-security/2020/10/09/1
https://www.openwall.com/lists/oss-security/2020/11/23/2
Common Vulnerability Exposure (CVE) ID: CVE-2020-28941
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZF4OGZPKTAJJXWHPIFP3LHEWWEMR5LPT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TITJQPYDWZ4NB2ONJWUXW75KSQIPF35T/
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d4122754442799187d5d537a9c039a49a67e57f1
https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/tty.git/commit/?h=tty-linus&id=d4122754442799187d5d537a9c039a49a67e57f1
https://github.com/torvalds/linux/commit/d4122754442799187d5d537a9c039a49a67e57f1
https://www.openwall.com/lists/oss-security/2020/11/19/3
http://www.openwall.com/lists/oss-security/2020/11/19/5
Common Vulnerability Exposure (CVE) ID: CVE-2020-28974
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.9.7
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c4e0dff2095c579b142d5a0693257f1c58b4804
https://seclists.org/oss-sec/2020/q4/104
http://www.openwall.com/lists/oss-security/2020/11/25/1
Common Vulnerability Exposure (CVE) ID: CVE-2020-4788
https://www.ibm.com/support/pages/node/6370729
https://www.oracle.com/security-alerts/cpujul2022.html
http://www.openwall.com/lists/oss-security/2020/11/20/3
http://www.openwall.com/lists/oss-security/2020/11/23/1
XForce ISS Database: ibm-i-cve20204788-info-disc (189296)
https://exchange.xforce.ibmcloud.com/vulnerabilities/189296
Common Vulnerability Exposure (CVE) ID: CVE-2020-8694
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00389
CopyrightCopyright (C) 2020 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.