vulnerability
Ubuntu: (Multiple Advisories) (CVE-2019-11833): Linux kernel vulnerabilities
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 2 | (AV:L/AC:L/Au:N/C:P/I:N/A:N) | May 15, 2019 | Jul 24, 2019 | Aug 18, 2025 |
Severity
2
CVSS
(AV:L/AC:L/Au:N/C:P/I:N/A:N)
Published
May 15, 2019
Added
Jul 24, 2019
Modified
Aug 18, 2025
Description
fs/ext4/extents.c in the Linux kernel through 5.1.2 does not zero out the unused memory region in the extent tree block, which might allow local users to obtain sensitive information by reading uninitialized data in the filesystem.
Solutions
ubuntu-upgrade-linux-image-4-15-0-1018-oracleubuntu-upgrade-linux-image-4-15-0-1037-gcpubuntu-upgrade-linux-image-4-15-0-1039-kvmubuntu-upgrade-linux-image-4-15-0-1041-raspi2ubuntu-upgrade-linux-image-4-15-0-1044-awsubuntu-upgrade-linux-image-4-15-0-1047-awsubuntu-upgrade-linux-image-4-15-0-1058-snapdragonubuntu-upgrade-linux-image-4-15-0-55-genericubuntu-upgrade-linux-image-4-15-0-55-generic-lpaeubuntu-upgrade-linux-image-4-15-0-55-lowlatencyubuntu-upgrade-linux-image-4-4-0-1050-awsubuntu-upgrade-linux-image-4-4-0-1052-kvmubuntu-upgrade-linux-image-4-4-0-1088-awsubuntu-upgrade-linux-image-4-4-0-1117-raspi2ubuntu-upgrade-linux-image-4-4-0-157-genericubuntu-upgrade-linux-image-4-4-0-157-generic-lpaeubuntu-upgrade-linux-image-4-4-0-157-lowlatencyubuntu-upgrade-linux-image-4-4-0-157-powerpc-e500mcubuntu-upgrade-linux-image-4-4-0-157-powerpc-smpubuntu-upgrade-linux-image-4-4-0-157-powerpc64-embubuntu-upgrade-linux-image-4-4-0-157-powerpc64-smpubuntu-upgrade-linux-image-4-4-0-159-genericubuntu-upgrade-linux-image-4-4-0-159-generic-lpaeubuntu-upgrade-linux-image-4-4-0-159-lowlatencyubuntu-upgrade-linux-image-4-4-0-159-powerpc-e500mcubuntu-upgrade-linux-image-4-4-0-159-powerpc-smpubuntu-upgrade-linux-image-4-4-0-159-powerpc64-embubuntu-upgrade-linux-image-4-4-0-159-powerpc64-smpubuntu-upgrade-linux-image-5-0-0-1011-awsubuntu-upgrade-linux-image-5-0-0-1011-gcpubuntu-upgrade-linux-image-5-0-0-1011-kvmubuntu-upgrade-linux-image-5-0-0-1012-azureubuntu-upgrade-linux-image-5-0-0-1013-raspi2ubuntu-upgrade-linux-image-5-0-0-1017-snapdragonubuntu-upgrade-linux-image-5-0-0-21-genericubuntu-upgrade-linux-image-5-0-0-21-generic-lpaeubuntu-upgrade-linux-image-5-0-0-21-lowlatencyubuntu-upgrade-linux-image-5-0-0-23-genericubuntu-upgrade-linux-image-5-0-0-23-generic-lpaeubuntu-upgrade-linux-image-5-0-0-23-lowlatencyubuntu-upgrade-linux-image-awsubuntu-upgrade-linux-image-aws-hweubuntu-upgrade-linux-image-azureubuntu-upgrade-linux-image-gcpubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-hwe-16-04ubuntu-upgrade-linux-image-generic-hwe-18-04ubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-generic-lpae-hwe-16-04ubuntu-upgrade-linux-image-generic-lpae-hwe-18-04ubuntu-upgrade-linux-image-generic-lpae-lts-xenialubuntu-upgrade-linux-image-generic-lts-xenialubuntu-upgrade-linux-image-gkeubuntu-upgrade-linux-image-kvmubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-lowlatency-hwe-16-04ubuntu-upgrade-linux-image-lowlatency-hwe-18-04ubuntu-upgrade-linux-image-lowlatency-lts-xenialubuntu-upgrade-linux-image-oemubuntu-upgrade-linux-image-oracleubuntu-upgrade-linux-image-powerpc-e500mcubuntu-upgrade-linux-image-powerpc-e500mc-lts-xenialubuntu-upgrade-linux-image-powerpc-smpubuntu-upgrade-linux-image-powerpc-smp-lts-xenialubuntu-upgrade-linux-image-powerpc64-embubuntu-upgrade-linux-image-powerpc64-emb-lts-xenialubuntu-upgrade-linux-image-powerpc64-smpubuntu-upgrade-linux-image-powerpc64-smp-lts-xenialubuntu-upgrade-linux-image-raspi2ubuntu-upgrade-linux-image-snapdragonubuntu-upgrade-linux-image-snapdragon-hwe-18-04ubuntu-upgrade-linux-image-virtualubuntu-upgrade-linux-image-virtual-hwe-16-04ubuntu-upgrade-linux-image-virtual-hwe-18-04ubuntu-upgrade-linux-image-virtual-lts-xenial
References
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.