First published: Fri Dec 28 2018(Updated: )
In the Linux kernel before 4.20.2, kernel/sched/fair.c mishandles leaf cfs_rq's, which allows attackers to cause a denial of service (infinite loop in update_blocked_averages) or possibly have unspecified other impact by inducing a high load.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:4.18.0-80.7.1.rt9.153.el8_0 | 0:4.18.0-80.7.1.rt9.153.el8_0 |
redhat/kernel | <0:4.18.0-80.7.1.el8_0 | 0:4.18.0-80.7.1.el8_0 |
Linux Kernel | >=4.13<4.14.93 | |
Linux Kernel | >=4.19<4.19.15 | |
Linux Kernel | >=4.20<4.20.2 | |
Linux Kernel | =5.0-rc1 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =18.04 | |
Red Hat Enterprise Linux | =8.0 | |
redhat enterprise Linux for real time | =8 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.119-1 6.12.10-1 6.12.11-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-20784 has a severity rating that can lead to denial of service due to infinite loops in certain Linux kernel scheduling mechanisms.
To fix CVE-2018-20784, update your Linux kernel to versions 4.20.2 or newer, or apply the appropriate patches as specified by your distribution.
CVE-2018-20784 affects multiple Linux distributions including Red Hat Enterprise Linux, Ubuntu, and various versions of the Linux kernel.
CVE-2018-20784 is exploitable locally, allowing attackers to induce high loads leading to a denial of service on the affected systems.
Linux kernel versions prior to 4.20.2, specifically those between 4.13 and 4.19, as well as certain earlier kernel versions, are vulnerable to CVE-2018-20784.