In the Linux kernel before 4.20.14, expand_downwards in mm/mmap.c lacks a check for the mmap minimum address, which makes it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
21 Nov 2024, 04:51
Type | Values Removed | Values Added |
---|---|---|
References | () http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0a1d52994d440e21def1c2174932410b4f2a98a1 - Patch, Vendor Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00045.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00052.html - Mailing List, Third Party Advisory | |
References | () http://packetstormsecurity.com/files/156053/Reliable-Datagram-Sockets-RDS-rds_atomic_free_op-Privilege-Escalation.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://www.securityfocus.com/bid/107296 - Third Party Advisory, VDB Entry | |
References | () https://access.redhat.com/errata/RHSA-2019:0831 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2019:1479 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2019:1480 - Third Party Advisory | |
References | () https://bugs.chromium.org/p/project-zero/issues/detail?id=1792 - Exploit, Mailing List, Third Party Advisory | |
References | () https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.105 - Mailing List, Patch, Vendor Advisory | |
References | () https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.27 - Mailing List, Patch, Vendor Advisory | |
References | () https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.14 - Mailing List, Patch, Vendor Advisory | |
References | () https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.162 - Mailing List, Patch, Vendor Advisory | |
References | () https://github.com/torvalds/linux/commit/0a1d52994d440e21def1c2174932410b4f2a98a1 - Mailing List, Patch, Vendor Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html - Mailing List, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html - Mailing List, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html - Mailing List, Third Party Advisory | |
References | () https://usn.ubuntu.com/3930-1/ - Third Party Advisory | |
References | () https://usn.ubuntu.com/3930-2/ - Third Party Advisory | |
References | () https://usn.ubuntu.com/3931-1/ - Third Party Advisory | |
References | () https://usn.ubuntu.com/3931-2/ - Third Party Advisory | |
References | () https://usn.ubuntu.com/3932-1/ - Third Party Advisory | |
References | () https://usn.ubuntu.com/3932-2/ - Third Party Advisory | |
References | () https://usn.ubuntu.com/3933-1/ - Third Party Advisory | |
References | () https://usn.ubuntu.com/3933-2/ - Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/46502/ - Exploit, Third Party Advisory, VDB Entry |
Information
Published : 2019-03-05 22:29
Updated : 2024-11-21 04:51
NVD link : CVE-2019-9213
Mitre link : CVE-2019-9213
CVE.ORG link : CVE-2019-9213
JSON object : View
Products Affected
linux
- linux_kernel
opensuse
- leap
canonical
- ubuntu_linux
redhat
- enterprise_linux
debian
- debian_linux
CWE
CWE-476
NULL Pointer Dereference