First published: Thu Aug 15 2019(Updated: )
An issue was discovered in drivers/scsi/qedi/qedi_dbg.c in the Linux kernel before 5.1.12. In the qedi_dbg_* family of functions, there is an out-of-bounds read.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <0:3.10.0-1127.el7 | 0:3.10.0-1127.el7 |
redhat/kernel-rt | <0:4.18.0-193.rt13.51.el8 | 0:4.18.0-193.rt13.51.el8 |
redhat/kernel | <0:4.18.0-193.el8 | 0:4.18.0-193.el8 |
redhat/kernel | <5.1.12 | 5.1.12 |
Linux Kernel | <5.1.12 | |
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =18.04 | |
Ubuntu Linux | =19.10 | |
openSUSE | =15.0 | |
openSUSE | =15.1 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.13-1 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =19.10 |
Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2019-15090 is classified as a medium severity vulnerability due to its potential impact on system stability and data integrity.
To fix CVE-2019-15090, update your kernel to version 5.1.12 or later for affected Linux distributions.
CVE-2019-15090 affects Linux kernel versions prior to 5.1.12 and specific versions of Red Hat, Ubuntu, and openSUSE.
Currently, there is no known workaround for CVE-2019-15090, so updating the kernel is recommended.
CVE-2019-15090 is an out-of-bounds read vulnerability in the Linux kernel's qedi_dbg_* family of functions.