CVE-2019-15239

CVE Details

Release Date:2019-08-20

Description


In the Linux kernel, a certain net/ipv4/tcp_output.c change, which was properly incorporated into 4.16.12, was incorrectly backported to the earlier longterm kernels, introducing a new vulnerability that was potentially more severe than the issue that was intended to be fixed by backporting. Specifically, by adding to a write queue between disconnection and re-connection, a local attacker can trigger multiple use-after-free conditions. This can result in a kernel crash, or potentially in privilege escalation. NOTE: this affects (for example) Linux distributions that use 4.9.x longterm kernels before 4.9.190 or 4.14.x longterm kernels before 4.14.139.

See more information about CVE-2019-15239 from MITRE CVE dictionary and NIST NVD


CVSS v3.0 metrics


NOTE: The following CVSS v3.0 metrics and score provided are preliminary and subject to review.

Base Score: 7.8 Base Metrics: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Access Vector: Local network Attack Complexity: Low
Privileges Required: Low User Interaction: None
Scope: Unchanged Confidentiality Impact: High
Integrity Impact: High Availability Impact: High

Errata information


PlatformErrataRelease Date
Oracle Linux version 6 (dtrace-modules-3.8.13-118.39.1.el6uek)ELSA-2019-48102019-10-02
Oracle Linux version 6 (kernel-uek)ELSA-2019-48082019-10-01
Oracle Linux version 6 (kernel-uek)ELSA-2019-48102019-10-02
Oracle Linux version 7 (dtrace-modules-3.8.13-118.39.1.el7uek)ELSA-2019-48102019-10-02
Oracle Linux version 7 (kernel)ELSA-2019-39792019-11-26
Oracle Linux version 7 (kernel-uek)ELSA-2019-48082019-10-01
Oracle Linux version 7 (kernel-uek)ELSA-2019-48102019-10-02
Oracle VM version 3.4 (kernel-uek)OVMSA-2019-00462019-10-02



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete