ID

VAR-201906-0917


CVE

CVE-2019-0136


TITLE

Intel PROSet/Wireless WiFi Software driver Access Control Error Vulnerability

Trust: 1.2

sources: CNVD: CNVD-2019-25748 // CNNVD: CNNVD-201906-530

DESCRIPTION

Insufficient access control in the Intel(R) PROSet/Wireless WiFi Software driver before version 21.10 may allow an unauthenticated user to potentially enable denial of service via adjacent access. Intel Dual Band Wireless-AC 8260 contains a denial-of-service (DoS) vulnerability (CWE-400). Yusuke Ogawa of Cisco Systems G.K. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.An attacker may be able to cause a denial-of-service (DoS). IntelPROSet/WirelessWiFiSoftwaredriver is a wireless network card driver from Intel Corporation of the United States. The vulnerability stems from a network system or product that does not properly restrict access to resources from unauthorized roles that an attacker could use to cause a denial of service. Intel PROSet/Wireless WiFi Software driver是美国英特尔(Intel)公司的一款无线网卡驱动程序. Intel PROSet/Wireless WiFi Software driver 21.10之前版本中存在访问控制错误漏洞。该漏洞源于网络系统或产品未正确限制来自未授权角色的资源访问。以下产品及版本受到影响:Intel Dual Band Wireless-AC 3160;Dual Band Wireless-AC 7260;Dual Band Wireless-N 7260;Wireless-N 7260;Dual Band Wireless-AC 7260 for Desktop;Dual Band Wireless-AC 7265 (Rev. C);Dual Band Wireless-N 7265 (Rev. C);Wireless-N 7265 (Rev. C);Dual Band Wireless-AC 3165;Dual Band Wireless-AC 7265 (Rev. D);Dual Band Wireless-N 7265 (Rev. D);Wireless-N 7265 (Rev. D);Dual Band Wireless-AC 3168;Tri-Band Wireless-AC 17265;Dual Band Wireless-AC 8260;Tri-Band Wireless-AC 18260;Dual Band Wireless-AC 8265;Dual Band Wireless-AC 8265 Desktop Kit;Tri-Band Wireless-AC 18265;Wireless-AC 9560;Wireless-AC 9461;Wireless-AC 9462;Wireless-AC 9260;Wi-Fi 6 AX200;Wi-Fi 6 AX201. An attacker can exploit this issue to cause a denial-of-service condition, denying service to legitimate users. (CVE-2019-11477) Jonathan Looney discovered that the TCP retransmission queue implementation in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. (CVE-2019-14835) Update instructions: The problem can be corrected by updating your livepatches to the following versions: | Kernel | Version | flavors | |--------------------------+----------+--------------------------| | 4.4.0-148.174 | 58.1 | lowlatency, generic | | 4.4.0-148.174~14.04.1 | 58.1 | lowlatency, generic | | 4.4.0-150.176 | 58.1 | generic, lowlatency | | 4.4.0-150.176~14.04.1 | 58.1 | lowlatency, generic | | 4.4.0-151.178 | 58.1 | lowlatency, generic | | 4.4.0-151.178~14.04.1 | 58.1 | generic, lowlatency | | 4.4.0-154.181 | 58.1 | lowlatency, generic | | 4.4.0-154.181~14.04.1 | 58.1 | generic, lowlatency | | 4.4.0-157.185 | 58.1 | lowlatency, generic | | 4.4.0-157.185~14.04.1 | 58.1 | generic, lowlatency | | 4.4.0-159.187 | 58.1 | lowlatency, generic | | 4.4.0-159.187~14.04.1 | 58.1 | generic, lowlatency | | 4.4.0-161.189 | 58.1 | lowlatency, generic | | 4.4.0-161.189~14.04.1 | 58.1 | lowlatency, generic | | 4.4.0-164.192 | 58.1 | lowlatency, generic | | 4.4.0-164.192~14.04.1 | 58.1 | lowlatency, generic | | 4.4.0-165.193 | 58.1 | generic, lowlatency | | 4.4.0-1083.93 | 58.1 | aws | | 4.4.0-1084.94 | 58.1 | aws | | 4.4.0-1085.96 | 58.1 | aws | | 4.4.0-1087.98 | 58.1 | aws | | 4.4.0-1088.99 | 58.1 | aws | | 4.4.0-1090.101 | 58.1 | aws | | 4.4.0-1092.103 | 58.1 | aws | | 4.4.0-1094.105 | 58.1 | aws | | 4.15.0-50.54 | 58.1 | generic, lowlatency | | 4.15.0-50.54~16.04.1 | 58.1 | generic, lowlatency | | 4.15.0-51.55 | 58.1 | generic, lowlatency | | 4.15.0-51.55~16.04.1 | 58.1 | generic, lowlatency | | 4.15.0-52.56 | 58.1 | lowlatency, generic | | 4.15.0-52.56~16.04.1 | 58.1 | generic, lowlatency | | 4.15.0-54.58 | 58.1 | generic, lowlatency | | 4.15.0-54.58~16.04.1 | 58.1 | generic, lowlatency | | 4.15.0-55.60 | 58.1 | generic, lowlatency | | 4.15.0-58.64 | 58.1 | generic, lowlatency | | 4.15.0-58.64~16.04.1 | 58.1 | lowlatency, generic | | 4.15.0-60.67 | 58.1 | lowlatency, generic | | 4.15.0-60.67~16.04.1 | 58.1 | generic, lowlatency | | 4.15.0-62.69 | 58.1 | generic, lowlatency | | 4.15.0-62.69~16.04.1 | 58.1 | lowlatency, generic | | 4.15.0-64.73 | 58.1 | generic, lowlatency | | 4.15.0-64.73~16.04.1 | 58.1 | lowlatency, generic | | 4.15.0-65.74 | 58.1 | lowlatency, generic | | 4.15.0-1038.43 | 58.1 | oem | | 4.15.0-1039.41 | 58.1 | aws | | 4.15.0-1039.44 | 58.1 | oem | | 4.15.0-1040.42 | 58.1 | aws | | 4.15.0-1041.43 | 58.1 | aws | | 4.15.0-1043.45 | 58.1 | aws | | 4.15.0-1043.48 | 58.1 | oem | | 4.15.0-1044.46 | 58.1 | aws | | 4.15.0-1045.47 | 58.1 | aws | | 4.15.0-1045.50 | 58.1 | oem | | 4.15.0-1047.49 | 58.1 | aws | | 4.15.0-1047.51 | 58.1 | azure | | 4.15.0-1048.50 | 58.1 | aws | | 4.15.0-1049.54 | 58.1 | azure | | 4.15.0-1050.52 | 58.1 | aws | | 4.15.0-1050.55 | 58.1 | azure | | 4.15.0-1050.57 | 58.1 | oem | | 4.15.0-1051.53 | 58.1 | aws | | 4.15.0-1051.56 | 58.1 | azure | | 4.15.0-1052.57 | 58.1 | azure | | 4.15.0-1055.60 | 58.1 | azure | | 4.15.0-1056.61 | 58.1 | azure | | 4.15.0-1056.65 | 58.1 | oem | | 4.15.0-1057.62 | 58.1 | azure | | 4.15.0-1057.66 | 58.1 | oem | | 4.15.0-1059.64 | 58.1 | azure | | 5.0.0-1014.14~18.04.1 | 58.1 | azure | | 5.0.0-1016.17~18.04.1 | 58.1 | azure | | 5.0.0-1018.19~18.04.1 | 58.1 | azure | | 5.0.0-1020.21~18.04.1 | 58.1 | azure | Support Information: Kernels older than the levels listed below do not receive livepatch updates. Please upgrade your kernel as soon as possible. | Series | Version | Flavors | |------------------+------------------+--------------------------| | Ubuntu 18.04 LTS | 4.15.0-1039 | aws | | Ubuntu 16.04 LTS | 4.4.0-1083 | aws | | Ubuntu 18.04 LTS | 5.0.0-1000 | azure | | Ubuntu 16.04 LTS | 4.15.0-1047 | azure | | Ubuntu 18.04 LTS | 4.15.0-50 | generic lowlatency | | Ubuntu 16.04 LTS | 4.15.0-50 | generic lowlatency | | Ubuntu 14.04 LTS | 4.4.0-148 | generic lowlatency | | Ubuntu 18.04 LTS | 4.15.0-1038 | oem | | Ubuntu 16.04 LTS | 4.4.0-148 | generic lowlatency | References: CVE-2016-10905, CVE-2018-20856, CVE-2018-20961, CVE-2018-20976, CVE-2018-21008, CVE-2019-0136, CVE-2019-2054, CVE-2019-2181, CVE-2019-3846, CVE-2019-10126, CVE-2019-10207, CVE-2019-11477, CVE-2019-11478, CVE-2019-11833, CVE-2019-12614, CVE-2019-14283, CVE-2019-14284, CVE-2019-14814, CVE-2019-14815, CVE-2019-14816, CVE-2019-14821, CVE-2019-14835 -- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce . ========================================================================= Ubuntu Security Notice USN-4118-1 September 02, 2019 linux-aws vulnerabilities ========================================================================= A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 18.04 LTS - Ubuntu 16.04 LTS Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux-aws: Linux kernel for Amazon Web Services (AWS) systems - linux-aws-hwe: Linux kernel for Amazon Web Services (AWS-HWE) systems Details: It was discovered that the alarmtimer implementation in the Linux kernel contained an integer overflow vulnerability. (CVE-2018-13053) Wen Xu discovered that the XFS filesystem implementation in the Linux kernel did not properly track inode validations. (CVE-2018-13093) Wen Xu discovered that the f2fs file system implementation in the Linux kernel did not properly validate metadata. (CVE-2018-13096, CVE-2018-13097, CVE-2018-13098, CVE-2018-13099, CVE-2018-13100, CVE-2018-14614, CVE-2018-14615, CVE-2018-14616) Wen Xu and Po-Ning Tseng discovered that btrfs file system implementation in the Linux kernel did not properly validate metadata. (CVE-2018-14609, CVE-2018-14610, CVE-2018-14611, CVE-2018-14612, CVE-2018-14613) Wen Xu discovered that the HFS+ filesystem implementation in the Linux kernel did not properly handle malformed catalog data in some situations. (CVE-2018-14617) Vasily Averin and Pavel Tikhomirov discovered that the cleancache subsystem of the Linux kernel did not properly initialize new files in some situations. A local attacker could use this to expose sensitive information. (CVE-2018-16862) Hui Peng and Mathias Payer discovered that the Option USB High Speed driver in the Linux kernel did not properly validate metadata received from the device. (CVE-2018-19985) Hui Peng and Mathias Payer discovered that the USB subsystem in the Linux kernel did not properly handle size checks when handling an extra USB descriptor. (CVE-2018-20169) Zhipeng Xie discovered that an infinite loop could triggered in the CFS Linux kernel process scheduler. (CVE-2018-20784) It was discovered that a use-after-free error existed in the block layer subsystem of the Linux kernel when certain failure conditions occurred. (CVE-2018-20856) Eli Biham and Lior Neumann discovered that the Bluetooth implementation in the Linux kernel did not properly validate elliptic curve parameters during Diffie-Hellman key exchange in some situations. An attacker could use this to expose sensitive information. (CVE-2018-5383) It was discovered that the Intel wifi device driver in the Linux kernel did not properly validate certain Tunneled Direct Link Setup (TDLS). (CVE-2019-0136) It was discovered that a heap buffer overflow existed in the Marvell Wireless LAN device driver for the Linux kernel. (CVE-2019-10126) It was discovered that the Bluetooth UART implementation in the Linux kernel did not properly check for missing tty operations. (CVE-2019-10207) Amit Klein and Benny Pinkas discovered that the Linux kernel did not sufficiently randomize IP ID values generated for connectionless networking protocols. A remote attacker could use this to track particular Linux devices. (CVE-2019-10638) Amit Klein and Benny Pinkas discovered that the location of kernel addresses could exposed by the implementation of connection-less network protocols in the Linux kernel. A remote attacker could possibly use this to assist in the exploitation of another vulnerability in the Linux kernel. (CVE-2019-10639) Adam Zabrocki discovered that the Intel i915 kernel mode graphics driver in the Linux kernel did not properly restrict mmap() ranges in some situations. (CVE-2019-11085) It was discovered that an integer overflow existed in the Linux kernel when reference counting pages, leading to potential use-after-free issues. (CVE-2019-11487) Jann Horn discovered that a race condition existed in the Linux kernel when performing core dumps. (CVE-2019-11599) It was discovered that a null pointer dereference vulnerability existed in the LSI Logic MegaRAID driver in the Linux kernel. (CVE-2019-11810) It was discovered that a race condition leading to a use-after-free existed in the Reliable Datagram Sockets (RDS) protocol implementation in the Linux kernel. The RDS protocol is blacklisted by default in Ubuntu. (CVE-2019-11815) It was discovered that the ext4 file system implementation in the Linux kernel did not properly zero out memory in some situations. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2019-11833) It was discovered that the Bluetooth Human Interface Device Protocol (HIDP) implementation in the Linux kernel did not properly verify strings were NULL terminated in certain situations. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2019-11884) It was discovered that a NULL pointer dereference vulnerabilty existed in the Near-field communication (NFC) implementation in the Linux kernel. (CVE-2019-12818) It was discovered that the MDIO bus devices subsystem in the Linux kernel improperly dropped a device reference in an error condition, leading to a use-after-free. (CVE-2019-12819) It was discovered that a NULL pointer dereference vulnerability existed in the Near-field communication (NFC) implementation in the Linux kernel. (CVE-2019-12984) Jann Horn discovered a use-after-free vulnerability in the Linux kernel when accessing LDT entries in some situations. (CVE-2019-13233) Jann Horn discovered that the ptrace implementation in the Linux kernel did not properly record credentials in some situations. (CVE-2019-13272) It was discovered that the GTCO tablet input driver in the Linux kernel did not properly bounds check the initial HID report sent by the device. (CVE-2019-13631) It was discovered that the floppy driver in the Linux kernel did not properly validate meta data, leading to a buffer overread. (CVE-2019-14283) It was discovered that the floppy driver in the Linux kernel did not properly validate ioctl() calls, leading to a division-by-zero. (CVE-2019-14284) Tuba Yavuz discovered that a race condition existed in the DesignWare USB3 DRD Controller device driver in the Linux kernel. (CVE-2019-14763) It was discovered that an out-of-bounds read existed in the QLogic QEDI iSCSI Initiator Driver in the Linux kernel. A local attacker could possibly use this to expose sensitive information (kernel memory). (CVE-2019-15090) It was discovered that the Raremono AM/FM/SW radio device driver in the Linux kernel did not properly allocate memory, leading to a use-after-free. (CVE-2019-15211) It was discovered at a double-free error existed in the USB Rio 500 device driver for the Linux kernel. (CVE-2019-15212) It was discovered that a race condition existed in the Advanced Linux Sound Architecture (ALSA) subsystem of the Linux kernel, leading to a potential use-after-free. (CVE-2019-15214) It was discovered that a race condition existed in the CPiA2 video4linux device driver for the Linux kernel, leading to a use-after-free. (CVE-2019-15215) It was discovered that a race condition existed in the Softmac USB Prism54 device driver in the Linux kernel. (CVE-2019-15220) It was discovered that a use-after-free vulnerability existed in the Appletalk implementation in the Linux kernel if an error occurs during initialization. (CVE-2019-15292) It was discovered that the Empia EM28xx DVB USB device driver implementation in the Linux kernel contained a use-after-free vulnerability when disconnecting the device. (CVE-2019-2024) It was discovered that the USB video device class implementation in the Linux kernel did not properly validate control bits, resulting in an out of bounds buffer read. A local attacker could use this to possibly expose sensitive information (kernel memory). (CVE-2019-2101) It was discovered that the Marvell Wireless LAN device driver in the Linux kernel did not properly validate the BSS descriptor. (CVE-2019-3846) Jason Wang discovered that an infinite loop vulnerability existed in the virtio net driver in the Linux kernel. (CVE-2019-3900) Daniele Antonioli, Nils Ole Tippenhauer, and Kasper B. Rasmussen discovered that the Bluetooth protocol BR/EDR specification did not properly require sufficiently strong encryption key lengths. A physicall proximate attacker could use this to expose sensitive information. (CVE-2019-9506) It was discovered that the Appletalk IP encapsulation driver in the Linux kernel did not properly prevent kernel addresses from being copied to user space. A local attacker with the CAP_NET_ADMIN capability could use this to expose sensitive information. (CVE-2018-20511) It was discovered that a race condition existed in the USB YUREX device driver in the Linux kernel. (CVE-2019-15216) It was discovered that the Siano USB MDTV receiver device driver in the Linux kernel made improper assumptions about the device characteristics. (CVE-2019-15218) It was discovered that the Line 6 POD USB device driver in the Linux kernel did not properly validate data size information from the device. (CVE-2019-15221) Muyu Yu discovered that the CAN implementation in the Linux kernel in some situations did not properly restrict the field size when processing outgoing frames. A local attacker with CAP_NET_ADMIN privileges could use this to execute arbitrary code. (CVE-2019-3701) Vladis Dronov discovered that the debug interface for the Linux kernel's HID subsystem did not properly validate passed parameters in some situations. (CVE-2019-3819) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 18.04 LTS: linux-image-4.15.0-1047-aws 4.15.0-1047.49 linux-image-aws 4.15.0.1047.46 Ubuntu 16.04 LTS: linux-image-4.15.0-1047-aws 4.15.0-1047.49~16.04.1 linux-image-aws-hwe 4.15.0.1047.47 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References: https://usn.ubuntu.com/4118-1 CVE-2018-13053, CVE-2018-13093, CVE-2018-13096, CVE-2018-13097, CVE-2018-13098, CVE-2018-13099, CVE-2018-13100, CVE-2018-14609, CVE-2018-14610, CVE-2018-14611, CVE-2018-14612, CVE-2018-14613, CVE-2018-14614, CVE-2018-14615, CVE-2018-14616, CVE-2018-14617, CVE-2018-16862, CVE-2018-19985, CVE-2018-20169, CVE-2018-20511, CVE-2018-20784, CVE-2018-20856, CVE-2018-5383, CVE-2019-0136, CVE-2019-10126, CVE-2019-10207, CVE-2019-10638, CVE-2019-10639, CVE-2019-11085, CVE-2019-11487, CVE-2019-11599, CVE-2019-11810, CVE-2019-11815, CVE-2019-11833, CVE-2019-11884, CVE-2019-12818, CVE-2019-12819, CVE-2019-12984, CVE-2019-13233, CVE-2019-13272, CVE-2019-13631, CVE-2019-14283, CVE-2019-14284, CVE-2019-14763, CVE-2019-15090, CVE-2019-15211, CVE-2019-15212, CVE-2019-15214, CVE-2019-15215, CVE-2019-15216, CVE-2019-15218, CVE-2019-15220, CVE-2019-15221, CVE-2019-15292, CVE-2019-2024, CVE-2019-2101, CVE-2019-3701, CVE-2019-3819, CVE-2019-3846, CVE-2019-3900, CVE-2019-9506 Package Information: https://launchpad.net/ubuntu/+source/linux-aws/4.15.0-1047.49 https://launchpad.net/ubuntu/+source/linux-aws-hwe/4.15.0-1047.49~16.04.1 . Unfortunately, as part of the update, a regression was introduced that caused a kernel crash when handling fragmented packets in some situations. This update addresses the issue. We apologize for the inconvenience

Trust: 3.51

sources: NVD: CVE-2019-0136 // JVNDB: JVNDB-2019-000046 // CNVD: CNVD-2019-25748 // CNNVD: CNNVD-201906-530 // BID: 108777 // PACKETSTORM: 154951 // PACKETSTORM: 154315 // PACKETSTORM: 154695 // PACKETSTORM: 154326 // PACKETSTORM: 154740 // PACKETSTORM: 154446

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2019-25748

AFFECTED PRODUCTS

vendor:intelmodel:dual band wireless-acscope:eqversion:7265

Trust: 1.2

vendor:intelmodel:dual band wireless-nscope:eqversion:7265

Trust: 1.2

vendor:intelmodel:wireless-nscope:eqversion:7265

Trust: 1.2

vendor:intelmodel:proset\/wireless wifiscope:ltversion:21.10

Trust: 1.0

vendor:intelmodel:accelerated storage managerscope: - version: -

Trust: 0.8

vendor:intelmodel:chipset device softwarescope: - version: -

Trust: 0.8

vendor:intelmodel:compute cardscope: - version: -

Trust: 0.8

vendor:intelmodel:compute stickscope: - version: -

Trust: 0.8

vendor:intelmodel:core i3scope: - version: -

Trust: 0.8

vendor:intelmodel:core i5scope: - version: -

Trust: 0.8

vendor:intelmodel:core x-seriesscope: - version: -

Trust: 0.8

vendor:intelmodel:nuc kitscope: - version: -

Trust: 0.8

vendor:intelmodel:omni-path fabric manager guiscope: - version: -

Trust: 0.8

vendor:intelmodel:pentiumscope:eqversion:processor 2000 series

Trust: 0.8

vendor:intelmodel:pentiumscope:eqversion:processor 3000 series

Trust: 0.8

vendor:intelmodel:pentiumscope:eqversion:processor g series

Trust: 0.8

vendor:intelmodel:proset/wireless software driverscope: - version: -

Trust: 0.8

vendor:intelmodel:raid web console v3scope:eqversion:for windows

Trust: 0.8

vendor:intelmodel:sgx dcap linux driverscope: - version: -

Trust: 0.8

vendor:intelmodel:sgx linux client driverscope: - version: -

Trust: 0.8

vendor:intelmodel:turbo boost max technologyscope: - version: -

Trust: 0.8

vendor:intelmodel:xeonscope:eqversion:processor e7 v3 family

Trust: 0.8

vendor:intelmodel:xeonscope:eqversion:processor e7 v5 family

Trust: 0.8

vendor:intelmodel:xeonscope:eqversion:processor e7 v7 family

Trust: 0.8

vendor:intelmodel:ite tech* consumer infrared driverscope:eqversion:for windows 10

Trust: 0.8

vendor:intelmodel:open cloud integrity technologyscope: - version: -

Trust: 0.8

vendor:intelmodel:openattestationscope: - version: -

Trust: 0.8

vendor:intelmodel:dual band wireless-ac 8260scope:lteversion:windows10 driver version 20.50.1.1

Trust: 0.8

vendor:intelmodel:dual band wireless-acscope:eqversion:3160

Trust: 0.6

vendor:intelmodel:dual band wireless-acscope:eqversion:7260

Trust: 0.6

vendor:intelmodel:dual band wireless-ac for desktopscope:eqversion:7260

Trust: 0.6

vendor:intelmodel:dual band wireless-acscope:eqversion:3165

Trust: 0.6

vendor:intelmodel:dual band wireless-acscope:eqversion:3168

Trust: 0.6

vendor:intelmodel:dual band wireless-acscope:eqversion:8260

Trust: 0.6

vendor:intelmodel:dual band wireless-acscope:eqversion:8265

Trust: 0.6

vendor:intelmodel:dual band wireless-ac desktop kitscope:eqversion:8265

Trust: 0.6

vendor:intelmodel:dual band wireless-nscope:eqversion:7260

Trust: 0.6

vendor:intelmodel:tri-band wireless-acscope:eqversion:18265

Trust: 0.6

vendor:intelmodel:tri-band wireless-acscope:eqversion:17265

Trust: 0.6

vendor:intelmodel:tri-band wireless-acscope:eqversion:18260

Trust: 0.6

vendor:intelmodel:wireless-acscope:eqversion:9560

Trust: 0.6

vendor:intelmodel:wireless-acscope:eqversion:9461

Trust: 0.6

vendor:intelmodel:wireless-acscope:eqversion:9462

Trust: 0.6

vendor:intelmodel:wireless-acscope:eqversion:9260

Trust: 0.6

vendor:intelmodel:wireless-nscope:eqversion:7260

Trust: 0.6

vendor:intelmodel:wi-fi ax200scope:eqversion:6

Trust: 0.6

vendor:intelmodel:wi-fi ax201scope:eqversion:6

Trust: 0.6

vendor:intelmodel:wireless-nscope:eqversion:72600

Trust: 0.3

vendor:intelmodel:wireless-acscope:eqversion:95600

Trust: 0.3

vendor:intelmodel:wireless-acscope:eqversion:94620

Trust: 0.3

vendor:intelmodel:wireless-acscope:eqversion:94610

Trust: 0.3

vendor:intelmodel:wireless-acscope:eqversion:92600

Trust: 0.3

vendor:intelmodel:wi-fi ax201scope:eqversion:60

Trust: 0.3

vendor:intelmodel:wi-fi ax200scope:eqversion:60

Trust: 0.3

vendor:intelmodel:tri-band wireless-acscope:eqversion:182650

Trust: 0.3

vendor:intelmodel:tri-band wireless-acscope:eqversion:182600

Trust: 0.3

vendor:intelmodel:tri-band wireless-acscope:eqversion:172650

Trust: 0.3

vendor:intelmodel:proset/wireless wifi softwarescope:eqversion:20.120.1

Trust: 0.3

vendor:intelmodel:proset/wireless wifi softwarescope:eqversion:17.16

Trust: 0.3

vendor:intelmodel:proset/wireless wifi softwarescope:eqversion:16.1.1

Trust: 0.3

vendor:intelmodel:proset/wireless wifi softwarescope:eqversion:15.8

Trust: 0.3

vendor:intelmodel:proset/wireless wifi softwarescope:eqversion:21.0

Trust: 0.3

vendor:intelmodel:proset/wireless wifi softwarescope:eqversion:20.100

Trust: 0.3

vendor:intelmodel:dual band wireless-nscope:eqversion:72650

Trust: 0.3

vendor:intelmodel:dual band wireless-nscope:eqversion:72600

Trust: 0.3

vendor:intelmodel:dual band wireless-ac desktop kitscope:eqversion:82650

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:eqversion:82650

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:eqversion:82600

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:eqversion:72650

Trust: 0.3

vendor:intelmodel:dual band wireless-ac for desktopscope:eqversion:72600

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:eqversion:72600

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:eqversion:31680

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:eqversion:31650

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:eqversion:31600

Trust: 0.3

vendor:intelmodel:proset/wireless wifi softwarescope:neversion:21.10

Trust: 0.3

sources: CNVD: CNVD-2019-25748 // BID: 108777 // JVNDB: JVNDB-2019-004980 // JVNDB: JVNDB-2019-000046 // NVD: CVE-2019-0136

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-0136
value: HIGH

Trust: 1.0

IPA: JVNDB-2019-000046
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2019-25748
value: LOW

Trust: 0.6

CNNVD: CNNVD-201906-530
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2019-0136
severity: LOW
baseScore: 3.3
vectorString: AV:A/AC:L/AU:N/C:N/I:N/A:P
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 6.5
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

IPA: JVNDB-2019-000046
severity: LOW
baseScore: 3.3
vectorString: AV:A/AC:L/AU:N/C:N/I:N/A:P
accessVector: ADJACENT NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2019-25748
severity: LOW
baseScore: 3.3
vectorString: AV:A/AC:L/AU:N/C:N/I:N/A:P
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 6.5
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2019-0136
baseSeverity: HIGH
baseScore: 7.4
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 4.0
version: 3.0

Trust: 1.0

IPA: JVNDB-2019-000046
baseSeverity: MEDIUM
baseScore: 4.3
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
attackVector: ADJACENT NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: LOW
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2019-25748 // JVNDB: JVNDB-2019-000046 // CNNVD: CNNVD-201906-530 // NVD: CVE-2019-0136

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:CWE-Other

Trust: 0.8

sources: JVNDB: JVNDB-2019-000046 // NVD: CVE-2019-0136

THREAT TYPE

remote or local

Trust: 0.6

sources: CNNVD: CNNVD-201906-530

TYPE

access control error

Trust: 0.6

sources: CNNVD: CNNVD-201906-530

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-004980

PATCH

title:[INTEL-SA-00232] Intel PROSet/Wireless WiFi Software Advisoryurl:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00232.html

Trust: 1.6

title:[INTEL-SA-00248] Open Cloud Integrity Technology and OpenAttestation Advisoryurl:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html

Trust: 0.8

title:[INTEL-SA-00257] Intel Omni-Path Fabric Manager GUI Advisoryurl:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00257.html

Trust: 0.8

title:[INTEL-SA-00259] Intel RAID Web Console 3 for Windows* Advisoryurl:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00259.html

Trust: 0.8

title:[INTEL-SA-00224] Intel Chipset Device Software (INF Update Utility) Advisoryurl:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00224.html

Trust: 0.8

title:[INTEL-SA-00264] Intel NUC Firmware Advisoryurl:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html

Trust: 0.8

title:[INTEL-SA-00226] Intel Accelerated Storage Manager in Intel Rapid Storage Technology Enterprise Advisoryurl:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00226.html

Trust: 0.8

title:[INTEL-SA-00206] ITE Tech* Consumer Infrared Driver for Windows 10 Advisoryurl:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00206.html

Trust: 0.8

title:[INTEL-SA-00235] Intel SGX for Linux Advisoryurl:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00235.html

Trust: 0.8

title:[INTEL-SA-00243] Intel Turbo Boost Max Technology 3.0 Advisoryurl:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00243.html

Trust: 0.8

title:[INTEL-SA-00247] Partial Physical Address Leakage Advisoryurl:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00247.html

Trust: 0.8

title:Downloads for Intel Dual Band Wireless-AC 8260url:https://downloadcenter.intel.com/en/product/86068

Trust: 0.8

title:IntelPROSet/WirelessWiFiSoftwaredriver Access Control Error Vulnerability Patchurl:https://www.cnvd.org.cn/patchInfo/show/173035

Trust: 0.6

title:Intel PROSet/Wireless WiFi Software driver Fixes for access control error vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=93761

Trust: 0.6

sources: CNVD: CNVD-2019-25748 // JVNDB: JVNDB-2019-004980 // JVNDB: JVNDB-2019-000046 // CNNVD: CNNVD-201906-530

EXTERNAL IDS

db:NVDid:CVE-2019-0136

Trust: 4.7

db:BIDid:108777

Trust: 2.5

db:JVNid:JVN75617741

Trust: 2.4

db:JVNDBid:JVNDB-2019-000046

Trust: 2.0

db:PACKETSTORMid:154951

Trust: 1.7

db:LENOVOid:LEN-27828

Trust: 1.6

db:JVNid:JVNVU95572531

Trust: 0.8

db:JVNDBid:JVNDB-2019-004980

Trust: 0.8

db:PACKETSTORMid:154326

Trust: 0.7

db:CNVDid:CNVD-2019-25748

Trust: 0.6

db:LENOVOid:LEN-27701

Trust: 0.6

db:AUSCERTid:ESB-2020.0766

Trust: 0.6

db:AUSCERTid:ESB-2022.0615

Trust: 0.6

db:AUSCERTid:ESB-2019.3334

Trust: 0.6

db:CNNVDid:CNNVD-201906-530

Trust: 0.6

db:PACKETSTORMid:154315

Trust: 0.1

db:PACKETSTORMid:154695

Trust: 0.1

db:PACKETSTORMid:154740

Trust: 0.1

db:PACKETSTORMid:154446

Trust: 0.1

sources: CNVD: CNVD-2019-25748 // BID: 108777 // JVNDB: JVNDB-2019-004980 // JVNDB: JVNDB-2019-000046 // PACKETSTORM: 154951 // PACKETSTORM: 154315 // PACKETSTORM: 154695 // PACKETSTORM: 154326 // PACKETSTORM: 154740 // PACKETSTORM: 154446 // CNNVD: CNNVD-201906-530 // NVD: CVE-2019-0136

REFERENCES

url:http://www.securityfocus.com/bid/108777

Trust: 2.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-0136

Trust: 2.8

url:http://jvn.jp/en/jp/jvn75617741/index.html

Trust: 2.4

url:https://usn.ubuntu.com/4115-1/

Trust: 2.2

url:https://usn.ubuntu.com/4147-1/

Trust: 2.2

url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00232.html

Trust: 1.9

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0136

Trust: 1.6

url:https://support.lenovo.com/us/en/product_security/len-27828

Trust: 1.6

url:http://packetstormsecurity.com/files/154951/kernel-live-patch-security-notice-lsn-0058-1.html

Trust: 1.6

url:https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html

Trust: 1.6

url:https://usn.ubuntu.com/4145-1/

Trust: 1.6

url:https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html

Trust: 1.6

url:https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html

Trust: 1.6

url:https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html

Trust: 1.6

url:https://usn.ubuntu.com/4118-1/

Trust: 1.6

url:https://jvndb.jvn.jp/en/contents/2019/jvndb-2019-000046.html

Trust: 1.2

url:https://www.intel.com/content/www/us/en/security-center/advisory/in

Trust: 1.2

url:http://www.intel.com/

Trust: 0.9

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0130

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0179

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11123

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0180

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11124

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0157

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0181

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11125

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0164

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0182

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11126

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11127

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0174

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0183

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11128

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0175

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11092

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11129

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-3702

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0177

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11117

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0128

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0178

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11119

Trust: 0.8

url:http://jvn.jp/cert/jvnvu95572531

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-0128

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-0178

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-11119

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-0130

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-0179

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-11123

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-0180

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-11124

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-0157

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-0181

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-11125

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-0164

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-0182

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-11126

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-0174

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-0183

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-11127

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-0175

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-11092

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-11128

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-3702

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-0177

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-11117

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-11129

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-10207

Trust: 0.6

url:https://usn.ubuntu.com/4116-1/

Trust: 0.6

url:https://usn.ubuntu.com/4114-1/

Trust: 0.6

url:https://support.lenovo.com/us/zh/product_security/len-27828

Trust: 0.6

url:https://support.lenovo.com/us/en/product_security/len-27701

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.3334/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.0766/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.0615

Trust: 0.6

url:https://packetstormsecurity.com/files/154326/ubuntu-security-notice-usn-4118-1.html

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2019-13631

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2019-11487

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2019-15211

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2019-15215

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2019-14284

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-14283

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-15221

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-11599

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-15090

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2018-20784

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-15220

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2018-19985

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-10639

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-10638

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-15218

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-15212

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2018-20856

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2016-10905

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-10126

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2018-20976

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2018-20961

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-11810

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-3819

Trust: 0.2

url:https://usn.ubuntu.com/4115-1

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-13648

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-15292

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-3701

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-3900

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-15216

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-14763

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-15214

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-15926

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-14815

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-11478

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-2181

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-14821

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-14835

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-11477

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-3846

Trust: 0.1

url:https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-14816

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-12614

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-21008

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-11833

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-2054

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-14814

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle/4.15.0-1022.25~16.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle/4.15.0-1022.25

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-hwe/4.15.0-60.67~16.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-kvm/4.15.0-1043.43

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gke-4.15/4.15.0-1041.43

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/4.15.0-60.67

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure/4.15.0-1056.61

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp/4.15.0-1041.43

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-raspi2/4.15.0-1044.47

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/4.4.0-1095.106

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-raspi2/4.4.0-1123.132

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-18509

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-kvm/4.4.0-1059.66

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/4.4.0-165.193

Trust: 0.1

url:https://usn.ubuntu.com/4145-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-snapdragon/4.4.0-1127.135

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-16862

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-14610

Trust: 0.1

url:https://usn.ubuntu.com/4118-1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-14616

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-13098

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-13093

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-20169

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-14614

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-11085

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-14611

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-13053

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/4.15.0-1047.49

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-14612

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-13099

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-20511

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-13100

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-14617

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws-hwe/4.15.0-1047.49~16.04.1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-5383

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-15223

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/5.0.0-31.33

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-15538

Trust: 0.1

url:https://usn.ubuntu.com/4147-1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-15118

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-15217

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-15925

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-snapdragon/5.0.0-1023.24

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-hwe/5.0.0-31.33~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp/5.0.0-1020.20

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-15117

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-raspi2/5.0.0-1019.19

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-9506

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/5.0.0-1018.20

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure/5.0.0-1022.23

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gke-5.0/5.0.0-1020.20~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-kvm/5.0.0-1019.20

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/4.15.0-62.69

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle/4.15.0-1023.26

Trust: 0.1

url:https://launchpad.net/bugs/1842447

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-kvm/4.15.0-1044.44

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gke-4.15/4.15.0-1042.44

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure/4.15.0-1057.62

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-raspi2/4.15.0-1045.49

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle/4.15.0-1023.26~16.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp/4.15.0-1042.44

Trust: 0.1

url:https://usn.ubuntu.com/4115-2

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-hwe/4.15.0-62.69~16.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/4.15.0-1048.50

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws-hwe/4.15.0-1048.50~16.04.1

Trust: 0.1

sources: CNVD: CNVD-2019-25748 // BID: 108777 // JVNDB: JVNDB-2019-004980 // JVNDB: JVNDB-2019-000046 // PACKETSTORM: 154951 // PACKETSTORM: 154315 // PACKETSTORM: 154695 // PACKETSTORM: 154326 // PACKETSTORM: 154740 // PACKETSTORM: 154446 // CNNVD: CNNVD-201906-530 // NVD: CVE-2019-0136

CREDITS

Ubuntu,JPCERT

Trust: 0.6

sources: CNNVD: CNNVD-201906-530

SOURCES

db:CNVDid:CNVD-2019-25748
db:BIDid:108777
db:JVNDBid:JVNDB-2019-004980
db:JVNDBid:JVNDB-2019-000046
db:PACKETSTORMid:154951
db:PACKETSTORMid:154315
db:PACKETSTORMid:154695
db:PACKETSTORMid:154326
db:PACKETSTORMid:154740
db:PACKETSTORMid:154446
db:CNNVDid:CNNVD-201906-530
db:NVDid:CVE-2019-0136

LAST UPDATE DATE

2024-11-23T19:54:27.382000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2019-25748date:2019-08-04T00:00:00
db:BIDid:108777date:2019-06-11T00:00:00
db:JVNDBid:JVNDB-2019-004980date:2019-06-13T00:00:00
db:JVNDBid:JVNDB-2019-000046date:2019-07-10T00:00:00
db:CNNVDid:CNNVD-201906-530date:2022-03-10T00:00:00
db:NVDid:CVE-2019-0136date:2024-11-21T04:16:18.603

SOURCES RELEASE DATE

db:CNVDid:CNVD-2019-25748date:2019-08-04T00:00:00
db:BIDid:108777date:2019-06-11T00:00:00
db:JVNDBid:JVNDB-2019-004980date:2019-06-13T00:00:00
db:JVNDBid:JVNDB-2019-000046date:2019-07-10T00:00:00
db:PACKETSTORMid:154951date:2019-10-23T18:32:10
db:PACKETSTORMid:154315date:2019-09-02T23:48:23
db:PACKETSTORMid:154695date:2019-10-01T20:45:14
db:PACKETSTORMid:154326date:2019-09-03T16:47:23
db:PACKETSTORMid:154740date:2019-10-05T14:13:57
db:PACKETSTORMid:154446date:2019-09-11T13:57:38
db:CNNVDid:CNNVD-201906-530date:2019-06-11T00:00:00
db:NVDid:CVE-2019-0136date:2019-06-13T16:29:00.763