First published: Thu Apr 23 2020(Updated: )
Last updated 29 November 2024
Credit: security@ubuntu.com security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | =5.0 | |
Linux Linux kernel | =5.3 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =19.10 | |
debian/linux | <=5.10.223-1<=5.10.226-1 | 6.1.115-1 6.1.119-1 6.12.5-1 6.12.6-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2019-15794.
The affected software includes the Linux kernel versions 5.0.0-1022.25 and 5.3.0-1008.9, as well as the Ubuntu 5.0 and 5.3 kernel series.
The vulnerability allows an attacker to overwrite arbitrary files in the underlying file system, potentially leading to privilege escalation or unauthorized access to sensitive information.
To fix CVE-2019-15794, it is recommended to update the affected software to the latest version provided by the Ubuntu or Linux kernel source.
Yes, you can find references for this vulnerability at the following URLs: [Reference 1](https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/eoan/commit/?id=270d16ae48a4dbf1c7e25e94cc3e38b4bea37635), [Reference 2](https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/eoan/commit/?id=ef81780548d20a786cc77ed4203fca146fd81ce3), [Reference 3](https://usn.ubuntu.com/usn/usn-4208-1)