Impact: Important Public Date: 2019-08-20 CWE: CWE-416 Bugzilla: 1747353: CVE-2019-15239 kernel: local attacker can trigger multiple use-after-free conditions results in privilege escalation In the Linux kernel, a certain net/ipv4/tcp_output.c change, which was properly incorporated into 4.16.12, was incorrectly backported to the earlier longterm kernels, introducing a new vulnerability that was potentially more severe than the issue that was intended to be fixed by backporting. Specifically, by adding to a write queue between disconnection and re-connection, a local attacker can trigger multiple use-after-free conditions. This can result in a kernel crash, or potentially in privilege escalation. NOTE: this affects (for example) Linux distributions that use 4.9.x longterm kernels before 4.9.190 or 4.14.x longterm kernels before 4.14.139.
The MITRE CVE dictionary describes this issue as:
Find out more about CVE-2019-15239 from the MITRE CVE dictionary dictionary and NIST NVD.
NOTE: The following CVSS v3 metrics and score provided are preliminary and subject to review.
CVSS3 Base Score | 8.4 |
---|---|
CVSS3 Base Metrics | CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Attack Vector | Local |
Attack Complexity | Low |
Privileges Required | None |
User Interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity Impact | High |
Availability Impact | High |
Platform | Package | State |
---|---|---|
Red Hat Virtualization 4 | kernel | Under investigation |
Red Hat Enterprise MRG 2 | kernel-rt | Under investigation |
Red Hat Enterprise Linux 8 | kernel | Under investigation |
Red Hat Enterprise Linux 8 | kernel-rt | Under investigation |
Red Hat Enterprise Linux 7 | kernel-alt | Under investigation |
Red Hat Enterprise Linux 7 | kernel | Under investigation |
Red Hat Enterprise Linux 7 | kernel-rt | Under investigation |
Red Hat Enterprise Linux 6 | kernel | Under investigation |
Red Hat Enterprise Linux 5 | kernel | Under investigation |