ID |
CVE-2019-15239
|
Summary |
In the Linux kernel, a certain net/ipv4/tcp_output.c change, which was properly incorporated into 4.16.12, was incorrectly backported to the earlier longterm kernels, introducing a new vulnerability that was potentially more severe than the issue that was intended to be fixed by backporting. Specifically, by adding to a write queue between disconnection and re-connection, a local attacker can trigger multiple use-after-free conditions. This can result in a kernel crash, or potentially in privilege escalation. NOTE: this affects (for example) Linux distributions that use 4.9.x longterm kernels before 4.9.190 or 4.14.x longterm kernels before 4.14.139. |
References |
|
Vulnerable Configurations |
-
cpe:2.3:o:linux:linux_kernel:4.16.12:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.16.12:*:*:*:*:*:*:*
-
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
-
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
|
CVSS |
Base: | 7.2 (as of 18-08-2020 - 15:05) |
Impact: | |
Exploitability: | |
|
CWE |
CWE-416 |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
LOCAL |
LOW |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
COMPLETE |
COMPLETE |
COMPLETE |
|
cvss-vector
via4
|
AV:L/AC:L/Au:N/C:C/I:C/A:C
|
redhat
via4
|
|
refmap
via4
|
misc | | suse | - openSUSE-SU-2019:2173
- openSUSE-SU-2019:2181
|
|
Last major update |
18-08-2020 - 15:05 |
Published |
20-08-2019 - 08:15 |
Last modified |
18-08-2020 - 15:05 |