vulnerability
Ubuntu: (Multiple Advisories) (CVE-2019-19532): Linux kernel vulnerabilities
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:L/AC:L/Au:N/C:P/I:P/A:P) | Dec 3, 2019 | Jan 8, 2020 | Aug 18, 2025 |
Severity
5
CVSS
(AV:L/AC:L/Au:N/C:P/I:P/A:P)
Published
Dec 3, 2019
Added
Jan 8, 2020
Modified
Aug 18, 2025
Description
In the Linux kernel before 5.3.9, there are multiple out-of-bounds write bugs that can be caused by a malicious USB device in the Linux kernel HID drivers, aka CID-d9d4b1e46d95. This affects drivers/hid/hid-axff.c, drivers/hid/hid-dr.c, drivers/hid/hid-emsff.c, drivers/hid/hid-gaff.c, drivers/hid/hid-holtekff.c, drivers/hid/hid-lg2ff.c, drivers/hid/hid-lg3ff.c, drivers/hid/hid-lg4ff.c, drivers/hid/hid-lgff.c, drivers/hid/hid-logitech-hidpp.c, drivers/hid/hid-microsoft.c, drivers/hid/hid-sony.c, drivers/hid/hid-tmff.c, and drivers/hid/hid-zpff.c.
Solutions
ubuntu-upgrade-linux-image-5-0-0-1009-oracleubuntu-upgrade-linux-image-5-0-0-1023-awsubuntu-upgrade-linux-image-5-0-0-1024-kvmubuntu-upgrade-linux-image-5-0-0-1024-raspi2ubuntu-upgrade-linux-image-5-0-0-1027-gkeubuntu-upgrade-linux-image-5-0-0-1028-azureubuntu-upgrade-linux-image-5-0-0-1028-gcpubuntu-upgrade-linux-image-5-0-0-1033-oem-osp1ubuntu-upgrade-linux-image-5-0-0-38-genericubuntu-upgrade-linux-image-5-0-0-38-generic-lpaeubuntu-upgrade-linux-image-5-0-0-38-lowlatencyubuntu-upgrade-linux-image-awsubuntu-upgrade-linux-image-aws-edgeubuntu-upgrade-linux-image-azureubuntu-upgrade-linux-image-gcpubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-gkeubuntu-upgrade-linux-image-gke-5-0ubuntu-upgrade-linux-image-kvmubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-oem-osp1ubuntu-upgrade-linux-image-oracleubuntu-upgrade-linux-image-oracle-edgeubuntu-upgrade-linux-image-raspi2ubuntu-upgrade-linux-image-virtual
References
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.