First published: Wed Sep 04 2019(Updated: )
A flaw that allowed an attacker to leak kernel memory was found in the network subsystem where an attacker with permissions to create tun/tap devices can create a denial of service and panic the system.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Data Risk Manager | <=2.0.6 | |
Linux Linux kernel | >=2.6.38<3.16.70 | |
Linux Linux kernel | >=3.17<3.18.137 | |
Linux Linux kernel | >=3.19<4.4.177 | |
Linux Linux kernel | >=4.5<4.9.163 | |
Linux Linux kernel | >=4.10<4.14.106 | |
Linux Linux kernel | >=4.15<4.19.28 | |
Linux Linux kernel | >=4.20<4.20.15 | |
Linux Linux kernel | >=5.0<5.0.1 | |
redhat/kernel-rt | <0:3.10.0-1127.rt56.1093.el7 | 0:3.10.0-1127.rt56.1093.el7 |
redhat/kernel-alt | <0:4.14.0-115.18.1.el7a | 0:4.14.0-115.18.1.el7a |
redhat/kernel | <0:3.10.0-1127.el7 | 0:3.10.0-1127.el7 |
redhat/kernel | <0:3.10.0-957.56.1.el7 | 0:3.10.0-957.56.1.el7 |
redhat/kernel | <0:3.10.0-1062.26.1.el7 | 0:3.10.0-1062.26.1.el7 |
redhat/kernel-rt | <0:4.18.0-147.rt24.93.el8 | 0:4.18.0-147.rt24.93.el8 |
redhat/kernel | <0:4.18.0-147.el8 | 0:4.18.0-147.el8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)