NULL Pointer Dereference Affecting kernel-abi-whitelists package, versions *
Threat Intelligence
EPSS
0.14% (51st
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-CENTOS7-KERNELABIWHITELISTS-1996271
- published 26 Jul 2021
- disclosed 19 Jan 2019
Introduced: 19 Jan 2019
CVE-2019-18885 Open this link in a new tabHow to fix?
There is no fixed version for Centos:7
kernel-abi-whitelists
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream kernel-abi-whitelists
package and not the kernel-abi-whitelists
package as distributed by Centos
.
See How to fix?
for Centos:7
relevant fixed versions and status.
fs/btrfs/volumes.c in the Linux kernel before 5.1 allows a btrfs_verify_dev_extents NULL pointer dereference via a crafted btrfs image because fs_devices->devices is mishandled within find_device, aka CID-09ba3bc9dd15.
References
- https://security.netapp.com/advisory/ntap-20191205-0001/
- https://access.redhat.com/security/cve/CVE-2019-18885
- http://packetstormsecurity.com/files/156185/Kernel-Live-Patch-Security-Notice-LSN-0062-1.html
- https://github.com/bobfuzzer/CVE-2019-18885
- https://github.com/torvalds/linux/commit/09ba3bc9dd150457c506e4661380a6183af651c1
- https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=09ba3bc9dd150457c506e4661380a6183af651c1
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://lists.debian.org/debian-lts-announce/2020/08/msg00019.html
- https://usn.ubuntu.com/4254-1/
- https://usn.ubuntu.com/4254-2/
- https://usn.ubuntu.com/4258-1/
- https://usn.ubuntu.com/4287-1/
- https://usn.ubuntu.com/4287-2/
CVSS Scores
version 3.1