First published: Thu Apr 23 2020(Updated: )
Last updated 18 February 2025
Credit: security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | =5.0 | |
Linux Kernel | =5.3 | |
Ubuntu Linux | =18.04 | |
Ubuntu Linux | =19.10 | |
debian/linux | <=5.10.223-1<=5.10.226-1 | 6.1.123-1 6.1.128-1 6.12.12-1 6.12.15-1 |
Ubuntu | =18.04 | |
Ubuntu | =19.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2019-15794.
The affected software includes the Linux kernel versions 5.0.0-1022.25 and 5.3.0-1008.9, as well as the Ubuntu 5.0 and 5.3 kernel series.
The vulnerability allows an attacker to overwrite arbitrary files in the underlying file system, potentially leading to privilege escalation or unauthorized access to sensitive information.
To fix CVE-2019-15794, it is recommended to update the affected software to the latest version provided by the Ubuntu or Linux kernel source.
Yes, you can find references for this vulnerability at the following URLs: [Reference 1](https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/eoan/commit/?id=270d16ae48a4dbf1c7e25e94cc3e38b4bea37635), [Reference 2](https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/eoan/commit/?id=ef81780548d20a786cc77ed4203fca146fd81ce3), [Reference 3](https://usn.ubuntu.com/usn/usn-4208-1)