First published: Tue Nov 03 2020(Updated: )
A vulnerability was found in kernel, where a use-after-frees in nouveau's postclose() handler could happen if removing device (that is not common to remove video card physically without power-off, but same happens if "unbind" the driver).
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:4.18.0-372.9.1.rt7.166.el8 | 0:4.18.0-372.9.1.rt7.166.el8 |
redhat/kernel | <0:4.18.0-372.9.1.el8 | 0:4.18.0-372.9.1.el8 |
Linux Linux kernel | ||
Fedoraproject Fedora | =33 | |
Linux Linux kernel | >2.6.12<5.4.162 | |
Linux Linux kernel | >5.5<5.10.82 | |
Linux Linux kernel | >5.11<5.15.5 | |
Linux Linux kernel | =2.6.12 | |
Linux Linux kernel | =2.6.12-rc2 | |
Linux Linux kernel | =2.6.12-rc3 | |
Linux Linux kernel | =2.6.12-rc4 | |
Linux Linux kernel | =2.6.12-rc5 | |
Linux Linux kernel | =2.6.12-rc6 | |
Oracle Communications Cloud Native Core Binding Support Function | =22.1.3 | |
Oracle Communications Cloud Native Core Network Exposure Function | =22.1.1 | |
Oracle Communications Cloud Native Core Policy | =22.2.0 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.11.10-1 6.12.5-1 |
To mitigate this issue, prevent the module nouveau from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.