The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

weakness CVE-2019-19067 CVE-2019-19075 CVE-2019-19083

Linux kernel: three vulnerabilities via Memory Leak

Synthesis of the vulnerability

An attacker can use several vulnerabilities via Memory Leak of the Linux kernel.
Severity of this announce: 1/4.
Number of vulnerabilities in this bulletin: 3.
Creation date: 19/11/2019.
Références of this computer vulnerability: CERTFR-2019-AVI-602, CVE-2019-19067, CVE-2019-19075, CVE-2019-19083, USN-4208-1, USN-4210-1, VIGILANCE-VUL-30907.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

An attacker can use several vulnerabilities via Memory Leak of the Linux kernel.
Full Vigil@nce bulletin... (Free trial)

This vulnerability announce impacts software or systems such as Linux, Ubuntu.

Our Vigil@nce team determined that the severity of this cybersecurity threat is low.

The trust level is of type confirmed by the editor, with an origin of user shell.

This bulletin is about 3 vulnerabilities.

An attacker with a expert ability can exploit this computer threat bulletin.

Solutions for this threat

Linux kernel: version 5.3.8.
The version 5.3.8 is fixed:
  https://cdn.kernel.org/pub/linux/kernel/v5.x/

Ubuntu: new linux-image-4.15.0 packages.
New packages are available:
  Ubuntu 16.04 LTS: linux-image-generic-hwe-16.04 4.15.0.72.92
  Ubuntu 18.04 LTS: linux-image-generic 4.15.0.72.74

Ubuntu: new linux-image-5.3.0 packages.
New packages are available:
  Ubuntu 18.04 LTS: linux-image-gcp-edge 5.3.0.1009.9
  Ubuntu 19.10: linux-image-generic 5.3.0.24.28
Full Vigil@nce bulletin... (Free trial)

Computer vulnerabilities tracking service

Vigil@nce provides a software vulnerabilities database. The Vigil@nce security watch publishes vulnerability bulletins about threats impacting the information system. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications. The Vigil@nce vulnerability database contains several thousand vulnerabilities.