First published: Fri Feb 22 2019(Updated: )
In the Linux kernel before 4.20.5, attackers can trigger a drivers/char/ipmi/ipmi_msghandler.c use-after-free and OOPS by arranging for certain simultaneous execution of the code, as demonstrated by a "service ipmievd restart" loop.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | >=4.18<4.19.18 | |
Linux Linux kernel | >=4.20<4.20.5 | |
Linux Linux kernel | =5.0-rc1 | |
Linux Linux kernel | =5.0-rc2 | |
Linux Linux kernel | =5.0-rc3 | |
Linux Linux kernel | =5.0-rc4 | |
Netapp Hci Management Node | ||
Netapp Snapprotect | ||
Netapp Solidfire | ||
Netapp Cn1610 Firmware | ||
Netapp Cn1610 | ||
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =18.10 | |
openSUSE Leap | =15.0 | |
All of | ||
Netapp Cn1610 Firmware | ||
Netapp Cn1610 | ||
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.11.10-1 6.12.5-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this vulnerability is CVE-2019-9003.
The vulnerability is a use-after-free and OOPS vulnerability in the Linux kernel before 4.20.5, which can be triggered by certain simultaneous execution of code.
The vulnerability affects the Linux kernel versions before 4.20.5.
The vulnerability can be exploited by arranging for certain simultaneous execution of the code.
Yes, the vulnerability can be fixed by updating the Linux kernel to version 4.20.5 or later.