First published: Wed May 13 2020(Updated: )
In FreeBSD 12.1-STABLE before r356911, and 12.1-RELEASE before p5, insufficient checking in the cryptodev module allocated the size of a kernel buffer based on a user-supplied length allowing an unprivileged process to trigger a kernel panic.
Credit: secteam@freebsd.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD FreeBSD | =12.1 | |
FreeBSD FreeBSD | =12.1-p1 | |
FreeBSD FreeBSD | =12.1-p2 | |
FreeBSD FreeBSD | =12.1-p3 | |
FreeBSD FreeBSD | =12.1-p4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-15880 is a vulnerability in FreeBSD 12.1-STABLE and 12.1-RELEASE that allows an unprivileged process to trigger a kernel panic.
CVE-2019-15880 has a severity rating of 9.8 (critical).
The affected software for CVE-2019-15880 is FreeBSD 12.1-STABLE before r356911 and 12.1-RELEASE before p5.
To fix CVE-2019-15880, it is recommended to update to FreeBSD 12.1-STABLE r356911 or FreeBSD 12.1-RELEASE p5 or later.
More information about CVE-2019-15880 can be found at the following references: [CVE-2019-15880 - FreeBSD Advisory](https://security.FreeBSD.org/advisories/FreeBSD-SA-20:16.cryptodev.asc) and [CVE-2019-15880 - NetApp Advisory](https://security.netapp.com/advisory/ntap-20200518-0008/).