Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-9213

Опубликовано: 27 фев. 2019
Источник: redhat
CVSS3: 5.5

Описание

In the Linux kernel before 4.20.14, expand_downwards in mm/mmap.c lacks a check for the mmap minimum address, which makes it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task.

A flaw was found in mmap in the Linux kernel allowing the process to map a null page. This allows attackers to abuse this mechanism to turn null pointer dereferences into workable exploits.

Меры по смягчению последствий

Enabling selinux prevents the public exploit from working correctly.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5kernelNot affected
Red Hat Enterprise Linux 6kernelNot affected
Red Hat Enterprise Linux 7kernelNot affected
Red Hat Enterprise Linux 7kernel-rtNot affected
Red Hat Enterprise MRG 2kernelNot affected
Red Hat Enterprise Linux 7kernel-altFixedRHSA-2019:083123.04.2019
Red Hat Enterprise Linux 8kernel-rtFixedRHSA-2019:148017.06.2019
Red Hat Enterprise Linux 8kernelFixedRHSA-2019:147917.06.2019

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-476
https://bugzilla.redhat.com/show_bug.cgi?id=1686136kernel: lack of check for mmap minimum address in expand_downwards in mm/mmap.c leads to NULL pointer dereferences exploit on non-SMAP platforms

5.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.5
ubuntu
больше 6 лет назад

In the Linux kernel before 4.20.14, expand_downwards in mm/mmap.c lacks a check for the mmap minimum address, which makes it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task.

CVSS3: 5.5
nvd
больше 6 лет назад

In the Linux kernel before 4.20.14, expand_downwards in mm/mmap.c lacks a check for the mmap minimum address, which makes it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task.

CVSS3: 5.5
debian
больше 6 лет назад

In the Linux kernel before 4.20.14, expand_downwards in mm/mmap.c lack ...

suse-cvrf
около 6 лет назад

Security update for the Linux Kernel (Live Patch 23 for SLE 12 SP3)

CVSS3: 5.5
github
около 3 лет назад

In the Linux kernel before 4.20.14, expand_downwards in mm/mmap.c lacks a check for the mmap minimum address, which makes it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task.

5.5 Medium

CVSS3