Rapid7 Vulnerability & Exploit Database

Ubuntu: (Multiple Advisories) (CVE-2019-5108): Linux kernel (Azure) vulnerabilities

Back to Search

Ubuntu: (Multiple Advisories) (CVE-2019-5108): Linux kernel (Azure) vulnerabilities

Severity
3
CVSS
(AV:A/AC:L/Au:N/C:N/I:N/A:P)
Published
12/23/2019
Created
02/20/2020
Added
02/19/2020
Modified
04/14/2021

Description

An exploitable denial-of-service vulnerability exists in the Linux kernel prior to mainline 5.3. An attacker could exploit this vulnerability by triggering AP to send IAPP location updates for stations before the required authentication process has completed. This could lead to different denial-of-service scenarios, either by causing CAM table attacks, or by leading to traffic flapping if faking already existing clients in other nearby APs of the same wireless infrastructure. An attacker can forge Authentication and Association Request packets to trigger this vulnerability.

Solution(s)

  • ubuntu-upgrade-linux-image-4-15-0-1033-oracle
  • ubuntu-upgrade-linux-image-4-15-0-1052-gke
  • ubuntu-upgrade-linux-image-4-15-0-1053-kvm
  • ubuntu-upgrade-linux-image-4-15-0-1055-gcp
  • ubuntu-upgrade-linux-image-4-15-0-1055-raspi2
  • ubuntu-upgrade-linux-image-4-15-0-1060-aws
  • ubuntu-upgrade-linux-image-4-15-0-1069-azure
  • ubuntu-upgrade-linux-image-4-15-0-1071-azure
  • ubuntu-upgrade-linux-image-4-15-0-1072-snapdragon
  • ubuntu-upgrade-linux-image-4-15-0-88-generic
  • ubuntu-upgrade-linux-image-4-15-0-88-generic-lpae
  • ubuntu-upgrade-linux-image-4-15-0-88-lowlatency
  • ubuntu-upgrade-linux-image-4-4-0-1062-aws
  • ubuntu-upgrade-linux-image-4-4-0-1066-kvm
  • ubuntu-upgrade-linux-image-4-4-0-1102-aws
  • ubuntu-upgrade-linux-image-4-4-0-1129-raspi2
  • ubuntu-upgrade-linux-image-4-4-0-1133-snapdragon
  • ubuntu-upgrade-linux-image-4-4-0-174-generic
  • ubuntu-upgrade-linux-image-4-4-0-174-generic-lpae
  • ubuntu-upgrade-linux-image-4-4-0-174-lowlatency
  • ubuntu-upgrade-linux-image-4-4-0-174-powerpc-e500mc
  • ubuntu-upgrade-linux-image-4-4-0-174-powerpc-smp
  • ubuntu-upgrade-linux-image-4-4-0-174-powerpc64-emb
  • ubuntu-upgrade-linux-image-4-4-0-174-powerpc64-smp
  • ubuntu-upgrade-linux-image-5-0-0-1011-oracle
  • ubuntu-upgrade-linux-image-5-0-0-1025-aws
  • ubuntu-upgrade-linux-image-5-0-0-1030-gke
  • ubuntu-upgrade-linux-image-5-0-0-1031-gcp
  • ubuntu-upgrade-linux-image-5-0-0-1032-azure
  • ubuntu-upgrade-linux-image-aws
  • ubuntu-upgrade-linux-image-aws-hwe
  • ubuntu-upgrade-linux-image-aws-lts-18-04
  • ubuntu-upgrade-linux-image-azure
  • ubuntu-upgrade-linux-image-gcp
  • ubuntu-upgrade-linux-image-generic
  • ubuntu-upgrade-linux-image-generic-hwe-16-04
  • ubuntu-upgrade-linux-image-generic-lpae
  • ubuntu-upgrade-linux-image-generic-lpae-hwe-16-04
  • ubuntu-upgrade-linux-image-generic-lpae-lts-xenial
  • ubuntu-upgrade-linux-image-generic-lts-xenial
  • ubuntu-upgrade-linux-image-gke
  • ubuntu-upgrade-linux-image-gke-4-15
  • ubuntu-upgrade-linux-image-gke-5-0
  • ubuntu-upgrade-linux-image-kvm
  • ubuntu-upgrade-linux-image-lowlatency
  • ubuntu-upgrade-linux-image-lowlatency-hwe-16-04
  • ubuntu-upgrade-linux-image-lowlatency-lts-xenial
  • ubuntu-upgrade-linux-image-oem
  • ubuntu-upgrade-linux-image-oracle
  • ubuntu-upgrade-linux-image-oracle-lts-18-04
  • ubuntu-upgrade-linux-image-powerpc-e500mc
  • ubuntu-upgrade-linux-image-powerpc-e500mc-lts-xenial
  • ubuntu-upgrade-linux-image-powerpc-smp
  • ubuntu-upgrade-linux-image-powerpc-smp-lts-xenial
  • ubuntu-upgrade-linux-image-powerpc64-emb
  • ubuntu-upgrade-linux-image-powerpc64-emb-lts-xenial
  • ubuntu-upgrade-linux-image-powerpc64-smp
  • ubuntu-upgrade-linux-image-powerpc64-smp-lts-xenial
  • ubuntu-upgrade-linux-image-raspi2
  • ubuntu-upgrade-linux-image-snapdragon
  • ubuntu-upgrade-linux-image-virtual
  • ubuntu-upgrade-linux-image-virtual-hwe-16-04
  • ubuntu-upgrade-linux-image-virtual-lts-xenial

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;