An issue was discovered in the Linux kernel before 5.0.7. A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
02 Dec 2022, 19:46
Type | Values Removed | Values Added |
---|---|---|
References | (UBUNTU) https://usn.ubuntu.com/4005-1/ - Third Party Advisory | |
References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00055.html - Mailing List, Third Party Advisory | |
References | (CONFIRM) https://support.f5.com/csp/article/K50484570 - Third Party Advisory | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2019:2029 - Third Party Advisory | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2019:2837 - Third Party Advisory | |
References | (UBUNTU) https://usn.ubuntu.com/4008-1/ - Third Party Advisory | |
References | (MLIST) https://lists.debian.org/debian-lts-announce/2019/06/msg00010.html - Third Party Advisory | |
References | (UBUNTU) https://usn.ubuntu.com/4115-1/ - Third Party Advisory | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2019:1971 - Third Party Advisory | |
References | (UBUNTU) https://usn.ubuntu.com/4008-3/ - Third Party Advisory | |
References | (CONFIRM) https://security.netapp.com/advisory/ntap-20190719-0003/ - Third Party Advisory | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2020:0036 - Third Party Advisory | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2019:3217 - Third Party Advisory | |
References | (UBUNTU) https://usn.ubuntu.com/4118-1/ - Third Party Advisory | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2019:2043 - Third Party Advisory | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2019:1959 - Third Party Advisory | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2019:2736 - Third Party Advisory | |
References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00056.html - Mailing List, Third Party Advisory | |
References | (BID) http://www.securityfocus.com/bid/108286 - Third Party Advisory, VDB Entry | |
CPE | cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:* cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:* cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:* cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:* |
Information
Published : 2019-05-07 14:29
Updated : 2024-02-04 20:20
NVD link : CVE-2019-11810
Mitre link : CVE-2019-11810
CVE.ORG link : CVE-2019-11810
JSON object : View
Products Affected
canonical
- ubuntu_linux
debian
- debian_linux
linux
- linux_kernel