First published: Thu Oct 17 2019(Updated: )
In the Linux kernel before 5.3.4, a reference count usage error in the fib6_rule_suppress() function in the fib6 suppression feature of net/ipv6/fib6_rules.c, when handling the FIB_LOOKUP_NOREF flag, can be exploited by a local attacker to corrupt memory, aka CID-ca7a03c41753.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/linux | <5.3.0-19.20 | 5.3.0-19.20 |
ubuntu/linux | <5.4~ | 5.4~ |
ubuntu/linux-aws | <5.3.0-1004.4 | 5.3.0-1004.4 |
ubuntu/linux-aws | <5.4~ | 5.4~ |
ubuntu/linux-aws-5.0 | <5.4~ | 5.4~ |
ubuntu/linux-aws-hwe | <5.4~ | 5.4~ |
ubuntu/linux-azure | <5.3.0-1004.4 | 5.3.0-1004.4 |
ubuntu/linux-azure | <5.4~ | 5.4~ |
ubuntu/linux-azure-5.3 | <5.4~ | 5.4~ |
ubuntu/linux-azure-edge | <5.4~ | 5.4~ |
ubuntu/linux-gcp | <5.3.0-1005.5 | 5.3.0-1005.5 |
ubuntu/linux-gcp | <5.4~ | 5.4~ |
ubuntu/linux-gcp-5.3 | <5.4~ | 5.4~ |
ubuntu/linux-gcp-edge | <5.4~ | 5.4~ |
ubuntu/linux-gke-4.15 | <5.4~ | 5.4~ |
ubuntu/linux-gke-5.0 | <5.4~ | 5.4~ |
ubuntu/linux-hwe | <5.4~ | 5.4~ |
ubuntu/linux-hwe-edge | <5.4~ | 5.4~ |
ubuntu/linux-kvm | <5.3.0-1004.4 | 5.3.0-1004.4 |
ubuntu/linux-kvm | <5.4~ | 5.4~ |
ubuntu/linux-lts-trusty | <5.4~ | 5.4~ |
ubuntu/linux-lts-xenial | <5.4~ | 5.4~ |
ubuntu/linux-oem | <5.4~ | 5.4~ |
ubuntu/linux-oem-5.4 | <5.4~ | 5.4~ |
ubuntu/linux-oem-osp1 | <5.4~ | 5.4~ |
ubuntu/linux-oracle | <5.3.0-1003.3 | 5.3.0-1003.3 |
ubuntu/linux-oracle | <5.4~ | 5.4~ |
ubuntu/linux-oracle-5.0 | <5.4~ | 5.4~ |
ubuntu/linux-raspi2 | <5.3.0-1008.9 | 5.3.0-1008.9 |
ubuntu/linux-raspi2 | <5.4~ | 5.4~ |
ubuntu/linux-raspi2-5.3 | <5.4~ | 5.4~ |
ubuntu/linux-snapdragon | <5.4~ | 5.4~ |
debian/linux | 5.10.223-1 6.1.106-3 6.1.99-1 6.10.6-1 6.10.7-1 | |
Linux Kernel | >=5.3<5.3.4 | |
Ubuntu Linux | =19.10 | |
Linux kernel | >=5.3<5.3.4 |
disable unprivileged user namespaces if not needed via sudo sysctl kernel.unprivileged_userns_clone=0
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-18198 is a vulnerability in the Linux kernel that allows a local attacker to corrupt memory.
CVE-2019-18198 has a severity score of 7.8 out of 10.
Linux kernel versions before 5.3.4 are affected by CVE-2019-18198.
To fix CVE-2019-18198, you should update your Linux kernel to version 5.3.4 or later.
You can find more information about CVE-2019-18198 on the following links: [Link 1](https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.4), [Link 2](https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ca7a03c4175366a92cee0ccc4fec0038c3266e26), [Link 3](https://github.com/torvalds/linux/commit/ca7a03c4175366a92cee0ccc4fec0038c3266e26).