← Zuruck zu CVEs
CVE-2019-9213
MEDIUM5.5
Beschreibung
In the Linux kernel before 4.20.14, expand_downwards in mm/mmap.c lacks a check for the mmap minimum address, which makes it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task.
CVE Details
CVSS v3.1 Bewertung5.5
SchweregradMEDIUM
CVSS VektorCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
AngriffsvektorLOCAL
KomplexitatLOW
Erforderliche PrivilegienLOW
BenutzerinteraktionNONE
Veroffentlicht3/5/2019
Zuletzt geandert11/21/2024
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
canonical:ubuntu_linuxdebian:debian_linuxlinux:linux_kernelopensuse:leapredhat:enterprise_linux
Schwachen (CWE)
CWE-476
Referenzen
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0a1d52994d440e21def1c2174932410b4f2a98a1(cve@mitre.org)
http://packetstormsecurity.com/files/156053/Reliable-Datagram-Sockets-RDS-rds_atomic_free_op-Privilege-Escalation.html(cve@mitre.org)
http://www.securityfocus.com/bid/107296(cve@mitre.org)
https://access.redhat.com/errata/RHSA-2019:0831(cve@mitre.org)
https://access.redhat.com/errata/RHSA-2019:1479(cve@mitre.org)
https://access.redhat.com/errata/RHSA-2019:1480(cve@mitre.org)
https://usn.ubuntu.com/3930-1/(cve@mitre.org)
https://usn.ubuntu.com/3930-2/(cve@mitre.org)
https://usn.ubuntu.com/3931-1/(cve@mitre.org)
https://usn.ubuntu.com/3931-2/(cve@mitre.org)
https://usn.ubuntu.com/3932-1/(cve@mitre.org)
https://usn.ubuntu.com/3932-2/(cve@mitre.org)
https://usn.ubuntu.com/3933-1/(cve@mitre.org)
https://usn.ubuntu.com/3933-2/(cve@mitre.org)
https://www.exploit-db.com/exploits/46502/(cve@mitre.org)
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0a1d52994d440e21def1c2174932410b4f2a98a1(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00045.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00052.html(af854a3a-2127-422b-91ae-364da2661108)
http://packetstormsecurity.com/files/156053/Reliable-Datagram-Sockets-RDS-rds_atomic_free_op-Privilege-Escalation.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/107296(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:0831(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:1479(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:1480(af854a3a-2127-422b-91ae-364da2661108)
https://bugs.chromium.org/p/project-zero/issues/detail?id=1792(af854a3a-2127-422b-91ae-364da2661108)
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.105(af854a3a-2127-422b-91ae-364da2661108)
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.27(af854a3a-2127-422b-91ae-364da2661108)
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.14(af854a3a-2127-422b-91ae-364da2661108)
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.162(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/torvalds/linux/commit/0a1d52994d440e21def1c2174932410b4f2a98a1(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3930-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3930-2/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3931-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3931-2/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3932-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3932-2/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3933-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3933-2/(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/46502/(af854a3a-2127-422b-91ae-364da2661108)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.