First published: Wed Nov 27 2019(Updated: )
Last updated 24 March 2025
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=2.6.12<3.16.81 | |
Linux Kernel | >=3.17<4.4.208 | |
Linux Kernel | >=4.5<4.9.208 | |
Linux Kernel | >=4.10<4.14.162 | |
Linux Kernel | >=4.15<4.19.93 | |
Linux Kernel | >=4.20<5.3.8 | |
Debian Linux | =8.0 | |
Ubuntu | =18.04 | |
Ubuntu | =19.04 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.128-1 6.12.20-1 6.12.21-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10220 can lead to unauthorized access or manipulation of directory entry lists due to relative path injection.
CVE-2019-10220 affects Linux kernel versions between 2.6.12 and 5.3.8, along with specific versions of Debian and Ubuntu Linux.
To fix CVE-2019-10220, upgrade the Linux kernel to versions 5.10.223-1, 5.10.226-1, 6.1.123-1, 6.1.119-1, 6.12.10-1, or 6.12.11-1.
Systems running affected versions of the Linux kernel, particularly those using CIFS for file sharing, are vulnerable to CVE-2019-10220.
Yes, CVE-2019-10220 has been officially documented and recognized as a vulnerability affecting the Linux CIFS implementation.