CVE-2019-10125
high-risk
Published 2019-03-27
An issue was discovered in aio_poll() in fs/aio.c in the Linux kernel through 5.0.4. A file may be released by aio_poll_wake() if an expected event is triggered immediately (e.g., by the close of a pair of pipes) after the return of vfs_poll(), and this will cause a use-after-free.
Do I need to act?
~
3.9% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (7)
References (8)
Third Party Advisory
http://www.securityfocus.com/bid/107655
Third Party Advisory
https://security.netapp.com/advisory/ntap-20190411-0003/
Third Party Advisory
https://support.f5.com/csp/article/K29215970
Third Party Advisory
http://www.securityfocus.com/bid/107655
Third Party Advisory
https://security.netapp.com/advisory/ntap-20190411-0003/
Third Party Advisory
https://support.f5.com/csp/article/K29215970
53
/ 100
high-risk
Severity
32/34 · Critical
Exploitability
7/34 · Low
Exposure
14/34 · Moderate