
29/8/2019

4/8/2024
CVE-2019-5611: Input Validation
First published: Thu Aug 29 2019(Updated: )
In FreeBSD 12.0-STABLE before r350828, 12.0-RELEASE before 12.0-RELEASE-p10, 11.3-STABLE before r350829, 11.3-RELEASE before 11.3-RELEASE-p3, and 11.2-RELEASE before 11.2-RELEASE-p14, a missing check in the function to arrange data in a chain of mbufs could cause data returned not to be contiguous. Extra checks in the IPv6 stack could catch the error condition and trigger a kernel panic, leading to a remote denial of service.
Credit: secteam@freebsd.org
Affected Software | Affected Version | How to fix |
---|
FreeBSD Kernel | =11.2 | |
FreeBSD Kernel | =11.2-p10 | |
FreeBSD Kernel | =11.2-p11 | |
FreeBSD Kernel | =11.2-p12 | |
FreeBSD Kernel | =11.2-p13 | |
FreeBSD Kernel | =11.2-p2 | |
FreeBSD Kernel | =11.2-p3 | |
FreeBSD Kernel | =11.2-p4 | |
FreeBSD Kernel | =11.2-p5 | |
FreeBSD Kernel | =11.2-p6 | |
FreeBSD Kernel | =11.2-p7 | |
FreeBSD Kernel | =11.2-p8 | |
FreeBSD Kernel | =11.2-p9 | |
FreeBSD Kernel | =11.3 | |
FreeBSD Kernel | =11.3 | |
FreeBSD Kernel | =11.3-p1 | |
FreeBSD Kernel | =11.3-p2 | |
FreeBSD Kernel | =11.3-p3 | |
FreeBSD Kernel | =12.0 | |
FreeBSD Kernel | =12.0-p1 | |
FreeBSD Kernel | =12.0-p3 | |
FreeBSD Kernel | =12.0-p4 | |
FreeBSD Kernel | =12.0-p5 | |
FreeBSD Kernel | =12.0-p8 | |
IBM Data ONTAP | | |
Never miss a vulnerability like this again
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
Frequently Asked Questions
What is the severity of CVE-2019-5611?
CVE-2019-5611 is considered to be a medium severity vulnerability that could lead to data not being contiguous.
How do I fix CVE-2019-5611?
The fix for CVE-2019-5611 involves updating to FreeBSD 12.0-RELEASE-p10 or 11.3-RELEASE-p3 or later.
Which versions of FreeBSD are affected by CVE-2019-5611?
CVE-2019-5611 affects FreeBSD versions 11.2, 11.3, and 12.0 prior to the specified patch releases.
What is the nature of the vulnerability in CVE-2019-5611?
CVE-2019-5611 is a vulnerability due to a missing check in the function that arranges data in a chain of mbufs.
Is there any known exploit for CVE-2019-5611?
As of now, there are no public exploits documented for CVE-2019-5611.
- agent/references
- agent/type
- collector/mitre-cve
- source/MITRE
- agent/last-modified-date
- agent/author
- agent/severity
- agent/weakness
- agent/remedy
- agent/event
- agent/description
- agent/first-publish-date
- agent/source
- agent/softwarecombine
- agent/tags
- collector/nvd-index
- agent/software-canonical-lookup-request
- vendor/freebsd
- canonical/freebsd kernel
- version/freebsd kernel/11.2
- version/freebsd kernel/11.2-p10
- version/freebsd kernel/11.2-p11
- version/freebsd kernel/11.2-p12
- version/freebsd kernel/11.2-p13
- version/freebsd kernel/11.2-p2
- version/freebsd kernel/11.2-p3
- version/freebsd kernel/11.2-p4
- version/freebsd kernel/11.2-p5
- version/freebsd kernel/11.2-p6
- version/freebsd kernel/11.2-p7
- version/freebsd kernel/11.2-p8
- version/freebsd kernel/11.2-p9
- version/freebsd kernel/11.3
- version/freebsd kernel/11.3-p1
- version/freebsd kernel/11.3-p2
- version/freebsd kernel/11.3-p3
- version/freebsd kernel/12.0
- version/freebsd kernel/12.0-p1
- version/freebsd kernel/12.0-p3
- version/freebsd kernel/12.0-p4
- version/freebsd kernel/12.0-p5
- version/freebsd kernel/12.0-p8
- vendor/netapp
- canonical/ibm data ontap
Contact
SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.coBy using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203