First published: Fri Feb 22 2019(Updated: )
In the Linux kernel before 4.20.5, attackers can trigger a drivers/char/ipmi/ipmi_msghandler.c use-after-free and OOPS by arranging for certain simultaneous execution of the code, as demonstrated by a "service ipmievd restart" loop.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=4.18<4.19.18 | |
Linux Kernel | >=4.20<4.20.5 | |
Linux Kernel | =5.0-rc1 | |
Linux Kernel | =5.0-rc2 | |
Linux Kernel | =5.0-rc3 | |
Linux Kernel | =5.0-rc4 | |
NetApp SolidFire & HCI Management Node | ||
NetApp SnapProtect | ||
NetApp SolidFire & HCI Storage Node | ||
NetApp CN1610 | ||
NetApp CN1610 Firmware | ||
Ubuntu | =18.04 | |
Ubuntu | =18.10 | |
SUSE Linux | =15.0 | |
All of | ||
NetApp CN1610 | ||
NetApp CN1610 Firmware | ||
debian/linux | 5.10.223-1 5.10.234-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.17-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this vulnerability is CVE-2019-9003.
The vulnerability is a use-after-free and OOPS vulnerability in the Linux kernel before 4.20.5, which can be triggered by certain simultaneous execution of code.
The vulnerability affects the Linux kernel versions before 4.20.5.
The vulnerability can be exploited by arranging for certain simultaneous execution of the code.
Yes, the vulnerability can be fixed by updating the Linux kernel to version 4.20.5 or later.