Scan for free your assets for this vulnerability

Download Mageni to scan your assets for this plus 99,432 more vulnerabilities. It is free to get started and can be installed in Windows, macOS and Linux.

Debian LTS: Security Advisory for linux-4.19 (DLA-2385-1)

Information

Severity

Severity

Critical

Family

Family

Debian Local Security Checks

CVSSv2 Base

CVSSv2 Base

9.3

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:M/Au:N/C:C/I:C/A:C

Solution Type

Solution Type

Vendor Patch

Created

Created

1 year ago

Modified

Modified

1 year ago

Summary

The remote host is missing an update for the 'linux-4.19' package(s) announced via the DLA-2385-1 advisory.

Insight

Insight

Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service, or information leak. CVE-2019-3874 Kernel buffers allocated by the SCTP network protocol were not limited by the memory cgroup controller. A local user could potentially use this to evade container memory limits and to cause a denial of service (excessive memory use). CVE-2019-19448, CVE-2019-19813, CVE-2019-19816 'Team bobfuzzer' reported bugs in Btrfs that could lead to a use-after-free or heap buffer overflow, and could be triggered by crafted filesystem images. A user permitted to mount and access arbitrary filesystems could use these to cause a denial of service (crash or memory corruption) or possibly for privilege escalation. CVE-2020-10781 Luca Bruno of Red Hat discovered that the zram control file /sys/class/zram-control/hot_add was readable by all users. On a system with zram enabled, a local user could use this to cause a denial of service (memory exhaustion). CVE-2020-12888 It was discovered that the PCIe Virtual Function I/O (vfio-pci) driver allowed users to disable a device's memory space while it was still mapped into a process. On some hardware platforms, local users or guest virtual machines permitted to access PCIe Virtual Functions could use this to cause a denial of service (hardware error and crash). CVE-2020-14314 A bug was discovered in the ext4 filesystem that could lead to an out-of-bound read. A local user permitted to mount and access arbitrary filesystem images could use this to cause a denial of service (crash). CVE-2020-14331 A bug was discovered in the VGA console driver's soft-scrollback feature that could lead to a heap buffer overflow. On a system with a custom kernel that has CONFIG_VGACON_SOFT_SCROLLBACK enabled, a local user with access to a console could use this to cause a denial of service (crash or memory corruption) or possibly for privilege escalation. CVE-2020-14356 A bug was discovered in the cgroup subsystem's handling of socket references to cgroups. In some cgroup configurations, this could lead to a use-after-free. A local user might be able to use this to cause a denial of service (crash or memory corruption) or possibly for privilege escalation. CVE-2020-14385 A bug was discovered in XFS, which could lead to an extended attribute (xattr) wrongly being detected as invalid. A local user with access to an XFS filesystem could use this to cause a denial of service (filesystem shutdown). CVE-2020-14386 Or Cohen discovered a bug in the packet socket (AF_PACKET) implementation which could lead to a heap buffer overflow. A local ... Description truncated. Please see the references for more information.

Affected Software

Affected Software

'linux-4.19' package(s) on Debian Linux.

Detection Method

Detection Method

Checks if a vulnerable package version is present on the target host.

Solution

Solution

For Debian 9 stretch, these problems have been fixed in version 4.19.146-1~deb9u1. This update additionally fixes Debian bugs #966846, #966917, and #968567, and includes many more bug fixes from stable updates 4.19.133-4.19.146 inclusive. We recommend that you upgrade your linux-4.19 packages.

Know your vulnerabilities for free. Start using Mageni today.

Mageni can help you to find, assess and manage your vulnerabilities.

Get Started for Free
How Mageni can help you?

How Mageni can help you?

Mageni can help you to know and remediate your vulnerabilities reducing your risk exposure and minimizing the likelihood of a data breach while decreasing your spending.

60% of breach victims were breached due to an unpatched known vulnerability1

62% were unaware that they were vulnerable prior to the data breach1

$4.24 million cost per data breach on average; highest in 17-year report history2

Citations 1. Costs and Consequences of Gaps in Vulnerability Response, Ponemom Institute 2. Cost of a Data Breach Report 2021, IBM

Mageni makes easy to find, prioritize, and remediate the vulnerabilities

Supported by industry-leading vulnerability intelligence and CompTIA PenTest+ professionals, Mageni puts security expertise in your hands.

Internal and External Scans

Scan your internal and public assets for vulnerabilities.

Remediate

Get the recommendations to mitigate the risks and vulnerabilities.

Secure your Applications

Scan third-party applications like Java, Chrome, Adobe and more.

Comprehensive Coverage

Scan servers, workstations and network devices for vulnerabilities.

Report and Analyze

Receive a report of the vulnerabilities that affect your assets.

More visibility

Perform non-credentialed or credentialed scans.

Prioritize

Prioritize the vulnerabilities based on CVSS, severity and other variables.

SSL Certificates

Improve the security of your secure layer and certificates.

Simple and transparent pricing

Get started for free with 7 days trial plus Money-Back Guarantee for 7 days after the end of the trial

Stop worrying about your budget or licenses limits

Mageni provides unlimited vulnerability scans for unlimited assets at a fixed price so you don't have to worry anymore about your budget or license limits.

What's included

  • Unlimited vulnerability scans for unlimited assets

  • Support by Certified CompTIA PenTest+ Professional

  • Access to Support Portal

  • Email Support Monday through Friday 9AM-5PM EST

  • Vulnerability Database Updates

  • Software Maintenance with Patches and Bug Fixes

  • Unlimited Support Cases

  • Software Updates and Upgrades

Why should I get a subscription now?

Enjoy the peace of mind and confidence that comes from having Mageni working for you.

For the Earth

Like you, we love the planet, that's why Mageni is a Stripe Climate member and 1% of your subscription goes to carbon removal.

Start for Free plus Money-back Guarantee

Get started for free with 7 days trial plus your eligible for a full reimbursement within 7 calendar days of the end of your trial. You don't need a reason to request a refund and we won't ask you a question.

Talk to a CompTIA Pentest+ when you need

CompTIA PenTest+ is the certification for cybersecurity professionals tasked with penetration testing and vulnerability management. CompTIA Pentest+ is compliant with ISO 17024 standards and approved by the US DoD to meet directive 8140/8570.01-M requirements.

Payments Processed By Stripe

For your security all subscriptions made through this website (mageni.net) are processed by Stripe (stripe.com). Stripe has been audited by an independent PCI Qualified Security Assessor (QSA) and is certified as a PCI Level 1 Service Provider. This is the most stringent level of certification available in the payments industry.

Frequently asked questions

Can’t find the answer? Send an email to help@mageni.net

Do you offer a free plan?
No, and the reason is that to provide you a great service Mageni have invested heavily in people, process and technology. The personal developing the product and providing support is CompTIA PenTest+ certified. The infrastructure uses Amazon AWS datacenters which are state of the art. So the subscription is priced at only $4 USD per month to provide you a great service at the most affordable price.
Can I install Mageni in Windows, macOS and Linux?
Yes, please read the documentation for details.
Can I get a refund?
Yes, contact us within the first 7 days after the end of the trial and we'll send you the refund. No questions asked
Who process my credit card information?
Stripe a PCI DSS Certified payment platform
Can I cancel the subscription?
Yes, please feel free to cancel your subscription at anytime
Can I pause the subscription?
Yes, please feel free to pause your subscription at anytime. While is paused it won't generate charges but you won't receive updates.
Can I delete my account?
Yes, please feel free to do so at anytime, just make sure that prior to that you cancel your subscription
What are support hours?
Monday to Friday from 9AM to 5PM EST (New York)
Can I verify the CompTIA Pentest+ Certification?
Yes, please contact us
Is this subscription a contract?
No, you can cancel it at anytime that you wish.
How can I open a support ticket?
Please visit the support portal
Is the license limited per installation?
If you are a MSP (Managed Service Provider) or a Security Company, yes, the license is limited and please contact us for pricing. If you are an organization who whishes to install it on many branches the license is not limited and you can use the same license to install Mageni in your branches.

Ready to get started? Start you 7-day free trial