First published: Mon Apr 22 2019(Updated: )
Linux Kernel is vulnerable to a denial of service, caused by a page->_refcount overflow. A local attacker could exploit this vulnerability using FUSE with ~140GiB RAM usage to cause a denial of service.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <0:2.6.32-754.35.1.el6 | 0:2.6.32-754.35.1.el6 |
redhat/kernel-rt | <0:3.10.0-1062.18.1.rt56.1044.el7 | 0:3.10.0-1062.18.1.rt56.1044.el7 |
redhat/kernel-alt | <0:4.14.0-115.17.1.el7a | 0:4.14.0-115.17.1.el7a |
redhat/kernel | <0:3.10.0-1062.18.1.el7 | 0:3.10.0-1062.18.1.el7 |
redhat/kernel | <0:3.10.0-693.71.2.el7 | 0:3.10.0-693.71.2.el7 |
redhat/kernel | <0:3.10.0-957.56.1.el7 | 0:3.10.0-957.56.1.el7 |
redhat/kernel-rt | <0:4.18.0-80.11.1.rt9.156.el8_0 | 0:4.18.0-80.11.1.rt9.156.el8_0 |
redhat/kernel | <0:4.18.0-80.11.1.el8_0 | 0:4.18.0-80.11.1.el8_0 |
redhat/kernel-rt | <1:3.10.0-693.71.2.rt56.670.el6 | 1:3.10.0-693.71.2.rt56.670.el6 |
IBM Data Risk Manager | <=2.0.6 | |
Linux Linux kernel | <4.4.216 | |
Linux Linux kernel | >=4.5<4.9.181 | |
Linux Linux kernel | >=4.10<4.14.116 | |
Linux Linux kernel | >=4.15<4.19.39 | |
Linux Linux kernel | >=4.20<5.0.12 | |
Linux Linux kernel | =5.1-rc1 | |
Linux Linux kernel | =5.1-rc2 | |
Linux Linux kernel | =5.1-rc3 | |
Linux Linux kernel | =5.1-rc4 | |
Debian Debian Linux | =8.0 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =19.04 | |
ubuntu/linux | <4.15.0-60.67 | 4.15.0-60.67 |
ubuntu/linux | <5.0.0-21.22 | 5.0.0-21.22 |
ubuntu/linux | <5.1~ | 5.1~ |
ubuntu/linux | <4.4.0-165.193 | 4.4.0-165.193 |
ubuntu/linux-aws | <4.15.0-1047.49 | 4.15.0-1047.49 |
ubuntu/linux-aws | <5.0.0-1011.12 | 5.0.0-1011.12 |
ubuntu/linux-aws | <5.1~ | 5.1~ |
ubuntu/linux-aws | <4.4.0-1095.106 | 4.4.0-1095.106 |
ubuntu/linux-aws-5.0 | <5.1~ | 5.1~ |
ubuntu/linux-aws-hwe | <5.1~ | 5.1~ |
ubuntu/linux-aws-hwe | <4.15.0-1047.49~16.04.1 | 4.15.0-1047.49~16.04.1 |
ubuntu/linux-azure | <5.0.0-1014.14~18.04.1 | 5.0.0-1014.14~18.04.1 |
ubuntu/linux-azure | <5.0.0-1012.12 | 5.0.0-1012.12 |
ubuntu/linux-azure | <5.1~ | 5.1~ |
ubuntu/linux-azure | <4.15.0-1056.61 | 4.15.0-1056.61 |
ubuntu/linux-azure-5.3 | <5.1~ | 5.1~ |
ubuntu/linux-azure-edge | <5.0.0-1014.14~18.04.1 | 5.0.0-1014.14~18.04.1 |
ubuntu/linux-azure-edge | <5.1~ | 5.1~ |
ubuntu/linux-azure-edge | <4.15.0-1056.61 | 4.15.0-1056.61 |
ubuntu/linux-euclid | <5.1~ | 5.1~ |
ubuntu/linux-flo | <5.1~ | 5.1~ |
ubuntu/linux-gcp | <4.15.0-1042.45 | 4.15.0-1042.45 |
ubuntu/linux-gcp | <5.0.0-1011.11 | 5.0.0-1011.11 |
ubuntu/linux-gcp | <5.1~ | 5.1~ |
ubuntu/linux-gcp | <4.15.0-1041.43 | 4.15.0-1041.43 |
ubuntu/linux-gcp-5.3 | <5.1~ | 5.1~ |
ubuntu/linux-gcp-edge | <4.15.0-1042.45 | 4.15.0-1042.45 |
ubuntu/linux-gcp-edge | <5.1~ | 5.1~ |
ubuntu/linux-gke | <5.1~ | 5.1~ |
ubuntu/linux-gke-4.15 | <4.15.0-1041.43 | 4.15.0-1041.43 |
ubuntu/linux-gke-4.15 | <5.1~ | 5.1~ |
ubuntu/linux-gke-5.0 | <5.1~ | 5.1~ |
ubuntu/linux-goldfish | <5.1~ | 5.1~ |
ubuntu/linux-grouper | <5.1~ | 5.1~ |
ubuntu/linux-hwe | <5.0.0-23.24~18.04.1 | 5.0.0-23.24~18.04.1 |
ubuntu/linux-hwe | <5.1~ | 5.1~ |
ubuntu/linux-hwe | <4.15.0-60.67~16.04.1 | 4.15.0-60.67~16.04.1 |
ubuntu/linux-hwe-edge | <5.1~ | 5.1~ |
ubuntu/linux-hwe-edge | <4.15.0-60.67~16.04.1 | 4.15.0-60.67~16.04.1 |
ubuntu/linux-kvm | <4.15.0-1043.43 | 4.15.0-1043.43 |
ubuntu/linux-kvm | <5.0.0-1011.12 | 5.0.0-1011.12 |
ubuntu/linux-kvm | <5.1~ | 5.1~ |
ubuntu/linux-kvm | <4.4.0-1059.66 | 4.4.0-1059.66 |
ubuntu/linux-lts-trusty | <5.1~ | 5.1~ |
ubuntu/linux-lts-utopic | <5.1~ | 5.1~ |
ubuntu/linux-lts-vivid | <5.1~ | 5.1~ |
ubuntu/linux-lts-wily | <5.1~ | 5.1~ |
ubuntu/linux-lts-xenial | <5.1~ | 5.1~ |
ubuntu/linux-maguro | <5.1~ | 5.1~ |
ubuntu/linux-mako | <5.1~ | 5.1~ |
ubuntu/linux-manta | <5.1~ | 5.1~ |
ubuntu/linux-oem | <4.15.0-1056.65 | 4.15.0-1056.65 |
ubuntu/linux-oem | <4.15.0-1059.68 | 4.15.0-1059.68 |
ubuntu/linux-oem | <5.1~ | 5.1~ |
ubuntu/linux-oem-5.4 | <5.1~ | 5.1~ |
ubuntu/linux-oem-osp1 | <5.0.0-1015.16 | 5.0.0-1015.16 |
ubuntu/linux-oem-osp1 | <5.0.0-1018.20 | 5.0.0-1018.20 |
ubuntu/linux-oem-osp1 | <5.1~ | 5.1~ |
ubuntu/linux-oracle | <4.15.0-1022.25 | 4.15.0-1022.25 |
ubuntu/linux-oracle | <5.0.0-1004.8 | 5.0.0-1004.8 |
ubuntu/linux-oracle | <5.1~ | 5.1~ |
ubuntu/linux-oracle | <4.15.0-1022.25~16.04.1 | 4.15.0-1022.25~16.04.1 |
ubuntu/linux-oracle-5.0 | <5.1~ | 5.1~ |
ubuntu/linux-raspi2 | <4.15.0-1044.47 | 4.15.0-1044.47 |
ubuntu/linux-raspi2 | <5.0.0-1013.13 | 5.0.0-1013.13 |
ubuntu/linux-raspi2 | <5.1~ | 5.1~ |
ubuntu/linux-raspi2 | <4.4.0-1123.132 | 4.4.0-1123.132 |
ubuntu/linux-raspi2-5.3 | <5.1~ | 5.1~ |
ubuntu/linux-snapdragon | <4.15.0-1062.69 | 4.15.0-1062.69 |
ubuntu/linux-snapdragon | <5.0.0-1017.18 | 5.0.0-1017.18 |
ubuntu/linux-snapdragon | <5.1~ | 5.1~ |
ubuntu/linux-snapdragon | <4.4.0-1127.135 | 4.4.0-1127.135 |
debian/linux | 4.19.249-2 4.19.304-1 5.10.209-2 5.10.216-1 6.1.76-1 6.1.90-1 6.7.12-1 6.8.9-1 |
Preventing loading of the 'fuse' kernel module will prevent attackers from using this exploit against the system; howeve the functionality of being able to access the filesystems that would be allowed by fuse would no longer be allowed . See “How do I blacklist a kernel module to prevent it from loading automatically?" ( https://access.redhat.com/solutions/41278) for instructions on how to disable the 'fuse' kernel module from autoloading. This mitigation may not be suitable if access to the functionality provided by fuse is required.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)