Unrated severityNVD Advisory· Published Jul 26, 2019· Updated Aug 5, 2024
CVE-2018-20856
CVE-2018-20856
Description
An issue was discovered in the Linux kernel before 4.18.7. In block/blk-core.c, there is an __blk_drain_queue() use-after-free because a certain error case is mishandled.
Affected products
71- Linux/Linux kerneldescription
- osv-coords70 versionspkg:rpm/suse/kernel-default&distro=HPE%20Helion%20OpenStack%208pkg:rpm/suse/kernel-default&distro=SUSE%20Enterprise%20Storage%204pkg:rpm/suse/kernel-default&distro=SUSE%20Enterprise%20Storage%205pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2012%20SP2pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2012%20SP3pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCLpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSSpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-BCLpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-LTSSpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3pkg:rpm/suse/kernel-default&distro=SUSE%20OpenStack%20Cloud%207pkg:rpm/suse/kernel-default&distro=SUSE%20OpenStack%20Cloud%208pkg:rpm/suse/kernel-default&distro=SUSE%20OpenStack%20Cloud%20Crowbar%208pkg:rpm/suse/kernel-source&distro=HPE%20Helion%20OpenStack%208pkg:rpm/suse/kernel-source&distro=SUSE%20Enterprise%20Storage%204pkg:rpm/suse/kernel-source&distro=SUSE%20Enterprise%20Storage%205pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCLpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSSpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-BCLpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-LTSSpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3pkg:rpm/suse/kernel-source&distro=SUSE%20OpenStack%20Cloud%207pkg:rpm/suse/kernel-source&distro=SUSE%20OpenStack%20Cloud%208pkg:rpm/suse/kernel-source&distro=SUSE%20OpenStack%20Cloud%20Crowbar%208pkg:rpm/suse/kernel-syms&distro=HPE%20Helion%20OpenStack%208pkg:rpm/suse/kernel-syms&distro=SUSE%20Enterprise%20Storage%204pkg:rpm/suse/kernel-syms&distro=SUSE%20Enterprise%20Storage%205pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCLpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSSpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-BCLpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-LTSSpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3pkg:rpm/suse/kernel-syms&distro=SUSE%20OpenStack%20Cloud%207pkg:rpm/suse/kernel-syms&distro=SUSE%20OpenStack%20Cloud%208pkg:rpm/suse/kernel-syms&distro=SUSE%20OpenStack%20Cloud%20Crowbar%208pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_27&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_27&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_28&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_28&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_29&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_29&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_30&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_30&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_31&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_31&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_32&distro=SUSE%20Enterprise%20Storage%204pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_32&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_32&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_32&distro=SUSE%20OpenStack%20Cloud%207pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_23&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_23&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_24&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_24&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_25&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_25&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_26&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_26&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_27&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_27&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_28&distro=HPE%20Helion%20OpenStack%208pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_28&distro=SUSE%20Enterprise%20Storage%205pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_28&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_28&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_28&distro=SUSE%20OpenStack%20Cloud%208pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_28&distro=SUSE%20OpenStack%20Cloud%20Crowbar%208pkg:rpm/suse/kgraft-patch-SLE12-SP4_Update_0&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP4pkg:rpm/suse/kgraft-patch-SLE12-SP4_Update_1&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP4
< 4.4.180-94.103.1+ 69 more
- (no CPE)range: < 4.4.180-94.103.1
- (no CPE)range: < 4.4.121-92.120.1
- (no CPE)range: < 4.4.180-94.103.1
- (no CPE)range: < 4.4.121-92.120.1
- (no CPE)range: < 4.4.180-94.103.1
- (no CPE)range: < 4.4.121-92.120.1
- (no CPE)range: < 4.4.121-92.120.1
- (no CPE)range: < 4.4.180-94.103.1
- (no CPE)range: < 4.4.180-94.103.1
- (no CPE)range: < 4.4.121-92.120.1
- (no CPE)range: < 4.4.180-94.103.1
- (no CPE)range: < 4.4.121-92.120.1
- (no CPE)range: < 4.4.180-94.103.1
- (no CPE)range: < 4.4.180-94.103.1
- (no CPE)range: < 4.4.180-94.103.1
- (no CPE)range: < 4.4.121-92.120.1
- (no CPE)range: < 4.4.180-94.103.1
- (no CPE)range: < 4.4.121-92.120.1
- (no CPE)range: < 4.4.121-92.120.1
- (no CPE)range: < 4.4.180-94.103.1
- (no CPE)range: < 4.4.180-94.103.1
- (no CPE)range: < 4.4.121-92.120.1
- (no CPE)range: < 4.4.180-94.103.1
- (no CPE)range: < 4.4.121-92.120.1
- (no CPE)range: < 4.4.180-94.103.1
- (no CPE)range: < 4.4.180-94.103.1
- (no CPE)range: < 4.4.180-94.103.1
- (no CPE)range: < 4.4.121-92.120.1
- (no CPE)range: < 4.4.180-94.103.1
- (no CPE)range: < 4.4.121-92.120.1
- (no CPE)range: < 4.4.121-92.120.1
- (no CPE)range: < 4.4.180-94.103.1
- (no CPE)range: < 4.4.180-94.103.1
- (no CPE)range: < 4.4.121-92.120.1
- (no CPE)range: < 4.4.180-94.103.1
- (no CPE)range: < 4.4.121-92.120.1
- (no CPE)range: < 4.4.180-94.103.1
- (no CPE)range: < 4.4.180-94.103.1
- (no CPE)range: < 7-2.5
- (no CPE)range: < 7-2.5
- (no CPE)range: < 7-2.5
- (no CPE)range: < 7-2.5
- (no CPE)range: < 7-2.5
- (no CPE)range: < 7-2.5
- (no CPE)range: < 6-2.1
- (no CPE)range: < 6-2.1
- (no CPE)range: < 5-2.1
- (no CPE)range: < 5-2.1
- (no CPE)range: < 1-3.3.1
- (no CPE)range: < 1-3.3.1
- (no CPE)range: < 1-3.3.1
- (no CPE)range: < 1-3.3.1
- (no CPE)range: < 7-2.5
- (no CPE)range: < 7-2.5
- (no CPE)range: < 6-2.5
- (no CPE)range: < 6-2.5
- (no CPE)range: < 6-2.5
- (no CPE)range: < 6-2.5
- (no CPE)range: < 6-2.1
- (no CPE)range: < 6-2.1
- (no CPE)range: < 4-2.1
- (no CPE)range: < 4-2.1
- (no CPE)range: < 1-4.3.1
- (no CPE)range: < 1-4.3.1
- (no CPE)range: < 1-4.3.1
- (no CPE)range: < 1-4.3.1
- (no CPE)range: < 1-4.3.1
- (no CPE)range: < 1-4.3.1
- (no CPE)range: < 9-2.25.1
- (no CPE)range: < 8-2.5
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
24- access.redhat.com/errata/RHSA-2019:3055mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2019:3076mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2019:3089mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2019:3217mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2020:0100mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2020:0103mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2020:0543mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2020:0664mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2020:0698mitrevendor-advisoryx_refsource_REDHAT
- usn.ubuntu.com/4094-1/mitrevendor-advisoryx_refsource_UBUNTU
- usn.ubuntu.com/4116-1/mitrevendor-advisoryx_refsource_UBUNTU
- usn.ubuntu.com/4118-1/mitrevendor-advisoryx_refsource_UBUNTU
- www.debian.org/security/2019/dsa-4497mitrevendor-advisoryx_refsource_DEBIAN
- packetstormsecurity.com/files/154059/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.htmlmitrex_refsource_MISC
- packetstormsecurity.com/files/154408/Kernel-Live-Patch-Security-Notice-LSN-0055-1.htmlmitrex_refsource_MISC
- packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.htmlmitrex_refsource_MISC
- cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.18.7mitrex_refsource_MISC
- git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/mitrex_refsource_MISC
- github.com/torvalds/linux/commit/54648cf1ec2d7f4b6a71767799c45676a138ca24mitrex_refsource_MISC
- lists.debian.org/debian-lts-announce/2019/08/msg00017.htmlmitremailing-listx_refsource_MLIST
- seclists.org/bugtraq/2019/Aug/18mitremailing-listx_refsource_BUGTRAQ
- seclists.org/bugtraq/2019/Aug/26mitremailing-listx_refsource_BUGTRAQ
- security.netapp.com/advisory/ntap-20190905-0002/mitrex_refsource_CONFIRM
- support.f5.com/csp/article/K14673240mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.