CVE-2019-19532
Publication date 3 December 2019
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
In the Linux kernel before 5.3.9, there are multiple out-of-bounds write bugs that can be caused by a malicious USB device in the Linux kernel HID drivers, aka CID-d9d4b1e46d95. This affects drivers/hid/hid-axff.c, drivers/hid/hid-dr.c, drivers/hid/hid-emsff.c, drivers/hid/hid-gaff.c, drivers/hid/hid-holtekff.c, drivers/hid/hid-lg2ff.c, drivers/hid/hid-lg3ff.c, drivers/hid/hid-lg4ff.c, drivers/hid/hid-lgff.c, drivers/hid/hid-logitech-hidpp.c, drivers/hid/hid-microsoft.c, drivers/hid/hid-sony.c, drivers/hid/hid-tmff.c, and drivers/hid/hid-zpff.c.
From the Ubuntu Security Team
It was discovered that multiple USB HID device drivers in the Linux kernel did not properly validate device metadata on attachment, leading to out-of- bounds writes. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code.
Status
Package | Ubuntu Release | Status |
---|---|---|
linux | ||
20.04 LTS focal |
Not affected
|
|
18.04 LTS bionic |
Fixed 4.15.0-72.81
|
|
16.04 LTS xenial |
Fixed 4.4.0-170.199
|
|
14.04 LTS trusty | Ignored | |
linux-aws | ||
20.04 LTS focal |
Not affected
|
|
18.04 LTS bionic |
Fixed 4.15.0-1056.58
|
|
16.04 LTS xenial |
Fixed 4.4.0-1099.110
|
|
14.04 LTS trusty |
Fixed 4.4.0-1059.63
|
|
linux-aws-5.0 | ||
20.04 LTS focal | Not in release | |
18.04 LTS bionic |
Fixed 5.0.0-1023.26~18.04.1
|
|
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release | |
linux-aws-5.3 | ||
20.04 LTS focal | Not in release | |
18.04 LTS bionic |
Not affected
|
|
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release | |
linux-aws-5.4 | ||
20.04 LTS focal | Not in release | |
18.04 LTS bionic |
Not affected
|
|
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release | |
linux-aws-hwe | ||
20.04 LTS focal | Not in release | |
18.04 LTS bionic | Not in release | |
16.04 LTS xenial |
Fixed 4.15.0-1056.58~16.04.1
|
|
14.04 LTS trusty | Not in release | |
linux-azure | ||
20.04 LTS focal |
Not affected
|
|
18.04 LTS bionic |
Fixed 5.0.0-1028.30~18.04.1
|
|
16.04 LTS xenial |
Fixed 4.15.0-1064.69
|
|
14.04 LTS trusty |
Fixed 4.15.0-1064.69~14.04.1
|
|
linux-azure-4.15 | ||
20.04 LTS focal | Not in release | |
18.04 LTS bionic |
Not affected
|
|
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release | |
linux-azure-5.3 | ||
20.04 LTS focal | Not in release | |
18.04 LTS bionic |
Fixed 5.3.0-1008.9~18.04.1
|
|
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release | |
linux-azure-5.4 | ||
20.04 LTS focal | Not in release | |
18.04 LTS bionic |
Not affected
|
|
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release | |
linux-azure-edge | ||
20.04 LTS focal | Not in release | |
18.04 LTS bionic | Ignored | |
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release | |
linux-dell300x | ||
20.04 LTS focal | Not in release | |
18.04 LTS bionic |
Not affected
|
|
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release | |
linux-gcp | ||
20.04 LTS focal |
Not affected
|
|
18.04 LTS bionic |
Fixed 5.0.0-1028.29~18.04.1
|
|
16.04 LTS xenial |
Fixed 4.15.0-1050.53
|
|
14.04 LTS trusty | Not in release | |
linux-gcp-4.15 | ||
20.04 LTS focal | Not in release | |
18.04 LTS bionic |
Not affected
|
|
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release | |
linux-gcp-5.3 | ||
20.04 LTS focal | Not in release | |
18.04 LTS bionic |
Fixed 5.3.0-1009.10~18.04.1
|
|
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release | |
linux-gcp-5.4 | ||
20.04 LTS focal | Not in release | |
18.04 LTS bionic |
Not affected
|
|
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release | |
linux-gcp-edge | ||
20.04 LTS focal | Not in release | |
18.04 LTS bionic | Ignored | |
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release | |
linux-gke-4.15 | ||
20.04 LTS focal | Not in release | |
18.04 LTS bionic |
Fixed 4.15.0-1049.52
|
|
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release | |
linux-gke-5.0 | ||
20.04 LTS focal | Not in release | |
18.04 LTS bionic |
Fixed 5.0.0-1027.28~18.04.1
|
|
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release | |
linux-gke-5.3 | ||
20.04 LTS focal | Not in release | |
18.04 LTS bionic |
Not affected
|
|
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release | |
linux-gke-5.4 | ||
20.04 LTS focal | Not in release | |
18.04 LTS bionic |
Not affected
|
|
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release | |
linux-gkeop | ||
20.04 LTS focal |
Not affected
|
|
18.04 LTS bionic | Not in release | |
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release | |
linux-gkeop-5.4 | ||
20.04 LTS focal | Not in release | |
18.04 LTS bionic |
Not affected
|
|
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release | |
linux-hwe | ||
20.04 LTS focal | Not in release | |
18.04 LTS bionic |
Fixed 5.3.0-26.28~18.04.1
|
|
16.04 LTS xenial |
Fixed 4.15.0-72.81~16.04.1
|
|
14.04 LTS trusty | Not in release | |
linux-hwe-5.4 | ||
20.04 LTS focal | Not in release | |
18.04 LTS bionic |
Not affected
|
|
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release | |
linux-hwe-5.8 | ||
20.04 LTS focal |
Not affected
|
|
18.04 LTS bionic | Not in release | |
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release | |
linux-hwe-edge | ||
20.04 LTS focal | Not in release | |
18.04 LTS bionic | Ignored | |
16.04 LTS xenial | Ignored | |
14.04 LTS trusty | Not in release | |
linux-kvm | ||
20.04 LTS focal |
Not affected
|
|
18.04 LTS bionic |
Fixed 4.15.0-1051.51
|
|
16.04 LTS xenial |
Fixed 4.4.0-1063.70
|
|
14.04 LTS trusty | Not in release | |
linux-lts-trusty | ||
20.04 LTS focal | Not in release | |
18.04 LTS bionic | Not in release | |
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release | |
linux-lts-xenial | ||
20.04 LTS focal | Not in release | |
18.04 LTS bionic | Not in release | |
16.04 LTS xenial | Not in release | |
14.04 LTS trusty |
Fixed 4.4.0-170.199~14.04.1
|
|
linux-oem | ||
20.04 LTS focal | Not in release | |
18.04 LTS bionic |
Fixed 4.15.0-1065.75
|
|
16.04 LTS xenial | Ignored | |
14.04 LTS trusty | Not in release | |
linux-oem-5.10 | ||
20.04 LTS focal |
Not affected
|
|
18.04 LTS bionic | Not in release | |
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release | |
linux-oem-5.6 | ||
20.04 LTS focal |
Not affected
|
|
18.04 LTS bionic | Not in release | |
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release | |
linux-oem-osp1 | ||
20.04 LTS focal | Not in release | |
18.04 LTS bionic |
Fixed 5.0.0-1033.38
|
|
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release | |
linux-oracle | ||
20.04 LTS focal |
Not affected
|
|
18.04 LTS bionic |
Fixed 4.15.0-1030.33
|
|
16.04 LTS xenial |
Fixed 4.15.0-1030.33~16.04.1
|
|
14.04 LTS trusty | Not in release | |
linux-oracle-5.0 | ||
20.04 LTS focal | Not in release | |
18.04 LTS bionic |
Fixed 5.0.0-1009.14~18.04.1
|
|
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release | |
linux-oracle-5.3 | ||
20.04 LTS focal | Not in release | |
18.04 LTS bionic |
Not affected
|
|
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release | |
linux-oracle-5.4 | ||
20.04 LTS focal | Not in release | |
18.04 LTS bionic |
Not affected
|
|
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release | |
linux-raspi | ||
20.04 LTS focal |
Not affected
|
|
18.04 LTS bionic | Not in release | |
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release | |
linux-raspi-5.4 | ||
20.04 LTS focal | Not in release | |
18.04 LTS bionic |
Not affected
|
|
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release | |
linux-raspi2 | ||
20.04 LTS focal | Ignored | |
18.04 LTS bionic |
Fixed 4.15.0-1052.56
|
|
16.04 LTS xenial |
Fixed 4.4.0-1126.135
|
|
14.04 LTS trusty | Not in release | |
linux-raspi2-5.3 | ||
20.04 LTS focal | Not in release | |
18.04 LTS bionic |
Not affected
|
|
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release | |
linux-riscv | ||
20.04 LTS focal |
Not affected
|
|
18.04 LTS bionic | Not in release | |
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release | |
linux-snapdragon | ||
20.04 LTS focal | Not in release | |
18.04 LTS bionic |
Fixed 4.15.0-1069.76
|
|
16.04 LTS xenial |
Fixed 4.4.0-1130.138
|
|
14.04 LTS trusty | Not in release |
Get expanded security coverage with Ubuntu Pro
Reduce your average CVE exposure time from 98 days to 1 day with expanded CVE patching, ten-years security maintenance and optional support for the full stack of open-source applications. Free for personal use.
Get Ubuntu ProSeverity score breakdown
Parameter | Value |
---|---|
Base score | 6.8 · Medium |
Attack vector | Physical |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-4226-1
- Linux kernel vulnerabilities
- 7 January 2020
Other references
- https://git.kernel.org/linus/d9d4b1e46d9543a82c23f6df03f4ad697dab361b
- http://www.openwall.com/lists/oss-security/2019/12/03/4
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.9
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d9d4b1e46d9543a82c23f6df03f4ad697dab361b
- https://www.cve.org/CVERecord?id=CVE-2019-19532