First published: Tue Sep 03 2019(Updated: )
A flaw was found in the Linux kernel's video driver. A kernel pointer lead, due to a WARN_ON statement could lead to a local information disclosure with system execution privileges. User interaction is not needed for exploitation. The highest threat from this vulnerability is to data confidentiality.
Credit: security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:4.18.0-240.rt7.54.el8 | 0:4.18.0-240.rt7.54.el8 |
redhat/kernel | <0:4.18.0-240.el8 | 0:4.18.0-240.el8 |
Google Android | ||
openSUSE | =15.1 |
Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-9455 has a high severity rating due to its potential impact on data confidentiality.
To resolve CVE-2019-9455, upgrade to the appropriate patched kernel version, either kernel-rt 0:4.18.0-240.rt7.54.el8 or kernel 0:4.18.0-240.el8.
CVE-2019-9455 can result in local information disclosure with system execution privileges.
No, CVE-2019-9455 can be exploited without any user interaction.
CVE-2019-9455 affects specific versions of the Linux kernel, including Red Hat kernel-rt and kernel packages, as well as Google Android and openSUSE Leap 15.1.