First published: Tue Apr 14 2020(Updated: )
The pc-kernel snap build process hardcoded the --allow-insecure-repositories and --allow-unauthenticated apt options when creating the build chroot environment. This could allow an attacker who is able to perform a MITM attack between the build environment and the Ubuntu archive to install a malicious package within the build chroot. This issue affects pc-kernel versions prior to and including 2019-07-16
Credit: security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
Canonical C-kernel | <=2019-07-16 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-11480 is considered to have a high severity due to the potential for a Man-in-the-Middle (MITM) attack.
To fix CVE-2019-11480, update the Canonical C-kernel version to a patch version released after July 16, 2019.
CVE-2019-11480 affects versions of the Canonical C-kernel prior to its update on July 16, 2019.
The implications of CVE-2019-11480 include the risk of an attacker intercepting and manipulating packages during the build process.
Users and developers who utilize the affected versions of the Canonical C-kernel may be impacted by CVE-2019-11480.