Bug 1738705 (CVE-2018-20856)
Summary: | CVE-2018-20856 kernel: Use-after-free in __blk_drain_queue() function in block/blk-core.c | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Pedro Sampaio <psampaio> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | acaringi, airlied, asavkov, bhu, blc, brdeoliv, bskeggs, dhoward, dvlasenk, esammons, fhrbata, gsuckevi, hdegoede, hkrzesin, iboverma, ichavero, itamar, jarodwilson, jeremy, jforbes, jglisse, jlelli, joe.lawrence, john.j5live, jonathan, josef, jpoimboe, jross, jshortt, jstancek, jwboyer, kernel-maint, kernel-mgr, labbott, lgoncalv, linville, matt, mchehab, mcressma, mjg59, mlangsdo, mmilgram, nmurray, plougher, rhandlin, rt-maint, rvrbovsk, steved, williams, wmealing, yozone |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: |
A flaw was found in the Linux kernel’s block driver implementation (blk_drain_queue() function) where a use-after-free condition could be triggered while draining the outstanding command queue in the systems block device subsystem. An attacker could use this flaw to crash the system or corrupt local memory, which may lead to privilege escalation.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2019-10-16 06:51:20 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1738706, 1739326, 1739327, 1739328, 1739329, 1739330, 1753285, 1781349, 1781704, 1781705, 1781720, 1781721, 1781724, 1791872, 1791874, 1791876, 1791877 | ||
Bug Blocks: | 1738707 |
Description
Pedro Sampaio
2019-08-07 22:18:16 UTC
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1738706] This was fixed in Fedora with the 4.18.7 stable kernel update. This flaw is rated as important due to possible memory corruption or additional flow on effects. This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2019:3055 https://access.redhat.com/errata/RHSA-2019:3055 This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2019:3076 https://access.redhat.com/errata/RHSA-2019:3076 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2018-20856 This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2019:3089 https://access.redhat.com/errata/RHSA-2019:3089 This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2019:3217 https://access.redhat.com/errata/RHSA-2019:3217 This issue has been addressed in the following products: Red Hat Enterprise MRG 2 Via RHSA-2020:0100 https://access.redhat.com/errata/RHSA-2020:0100 This issue has been addressed in the following products: Red Hat Enterprise Linux 7.4 Advanced Update Support Red Hat Enterprise Linux 7.4 Update Services for SAP Solutions Red Hat Enterprise Linux 7.4 Telco Extended Update Support Via RHSA-2020:0103 https://access.redhat.com/errata/RHSA-2020:0103 This issue has been addressed in the following products: Red Hat Enterprise Linux 7.5 Extended Update Support Via RHSA-2020:0543 https://access.redhat.com/errata/RHSA-2020:0543 This issue has been addressed in the following products: Red Hat Enterprise Linux 7.6 Extended Update Support Via RHSA-2020:0664 https://access.redhat.com/errata/RHSA-2020:0664 This issue has been addressed in the following products: Red Hat Enterprise Linux 7.6 Extended Update Support Via RHSA-2020:0698 https://access.redhat.com/errata/RHSA-2020:0698 |