← Retour aux CVEs
CVE-2019-13233
N/ADescription
In arch/x86/lib/insn-eval.c in the Linux kernel before 5.1.9, there is a use-after-free for access to an LDT entry because of a race condition between modify_ldt() and a #BR exception for an MPX bounds violation.
Details CVE
Score CVSS v3.1N/A
Publie7/4/2019
Derniere modification11/21/2024
Sourcenvd
Observations honeypot0
Produits affectes
linux:linux_kernel
Faiblesses (CWE)
CWE-362CWE-416
References
http://packetstormsecurity.com/files/154408/Kernel-Live-Patch-Security-Notice-LSN-0055-1.html(cve@mitre.org)
https://access.redhat.com/errata/RHSA-2019:3309(cve@mitre.org)
https://access.redhat.com/errata/RHSA-2019:3517(cve@mitre.org)
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.9(cve@mitre.org)
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=de9f869616dd95e95c00bdd6b0fcd3421e8a4323(cve@mitre.org)
https://seclists.org/bugtraq/2019/Aug/13(cve@mitre.org)
https://security.netapp.com/advisory/ntap-20190806-0001/(cve@mitre.org)
https://support.f5.com/csp/article/K13331647?utm_source=f5support&%3Butm_medium=RSS(cve@mitre.org)
https://usn.ubuntu.com/4093-1/(cve@mitre.org)
https://usn.ubuntu.com/4094-1/(cve@mitre.org)
https://usn.ubuntu.com/4117-1/(cve@mitre.org)
https://usn.ubuntu.com/4118-1/(cve@mitre.org)
https://www.debian.org/security/2019/dsa-4495(cve@mitre.org)
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00025.html(af854a3a-2127-422b-91ae-364da2661108)
http://packetstormsecurity.com/files/154408/Kernel-Live-Patch-Security-Notice-LSN-0055-1.html(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:3309(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:3517(af854a3a-2127-422b-91ae-364da2661108)
https://bugs.chromium.org/p/project-zero/issues/detail?id=1879(af854a3a-2127-422b-91ae-364da2661108)
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.9(af854a3a-2127-422b-91ae-364da2661108)
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=de9f869616dd95e95c00bdd6b0fcd3421e8a4323(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/torvalds/linux/commit/de9f869616dd95e95c00bdd6b0fcd3421e8a4323(af854a3a-2127-422b-91ae-364da2661108)
https://seclists.org/bugtraq/2019/Aug/13(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20190806-0001/(af854a3a-2127-422b-91ae-364da2661108)
https://support.f5.com/csp/article/K13331647?utm_source=f5support&%3Butm_medium=RSS(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4093-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4094-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4117-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4118-1/(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2019/dsa-4495(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.