vulnerability
Ubuntu: (Multiple Advisories) (CVE-2019-2215): Linux kernel vulnerabilities
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:L/AC:L/Au:N/C:P/I:P/A:P) | Oct 11, 2019 | Nov 14, 2019 | Mar 27, 2026 |
Severity
5
CVSS
(AV:L/AC:L/Au:N/C:P/I:P/A:P)
Published
Oct 11, 2019
Added
Nov 14, 2019
Modified
Mar 27, 2026
Description
A use-after-free in binder.c allows an elevation of privilege from an application to the Linux Kernel. No user interaction is required to exploit this vulnerability, however exploitation does require either the installation of a malicious local application or a separate vulnerability in a network facing application.Product: AndroidAndroid ID: A-141720095
Solutions
ubuntu-upgrade-linux-image-4-4-0-1062-kvmubuntu-upgrade-linux-image-4-4-0-1098-awsubuntu-upgrade-linux-image-4-4-0-168-genericubuntu-upgrade-linux-image-4-4-0-168-generic-lpaeubuntu-upgrade-linux-image-4-4-0-168-lowlatencyubuntu-upgrade-linux-image-4-4-0-168-powerpc-e500mcubuntu-upgrade-linux-image-4-4-0-168-powerpc-smpubuntu-upgrade-linux-image-4-4-0-168-powerpc64-embubuntu-upgrade-linux-image-4-4-0-168-powerpc64-smpubuntu-upgrade-linux-image-awsubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-kvmubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-powerpc-e500mcubuntu-upgrade-linux-image-powerpc-smpubuntu-upgrade-linux-image-powerpc64-embubuntu-upgrade-linux-image-powerpc64-smpubuntu-upgrade-linux-image-virtual
References
Rapid7 Labs
2026 Global Threat Landscape Report
The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.