Risk | Low |
Patch available | YES |
Number of vulnerabilities | 5 |
CVE-ID | CVE-2019-17052 CVE-2019-17053 CVE-2019-17054 CVE-2019-17055 CVE-2019-17056 |
CWE-ID | CWE-264 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
Fedora Operating systems & Components / Operating system kernel-tools Operating systems & Components / Operating system package or component kernel-headers Operating systems & Components / Operating system package or component kernel Operating systems & Components / Operating system package or component |
Vendor | Fedoraproject |
Security Bulletin
This security bulletin contains information about 5 vulnerabilities.
EUVDB-ID: #VU22741
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2019-17052
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to the ax25_create() function in net/ax25/af_ax25.c in the AF_AX25 network module for the Linux kernel does not enforce CAP_NET_RAW when creating raw sockets. A local unprivileged user can create raw sockets on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsFedora: 31
kernel-tools: before 5.3.4-300.fc31
kernel-headers: before 5.3.4-300.fc31
kernel: before 5.3.4-300.fc31
CPE2.3https://bodhi.fedoraproject.org/updates/FEDORA-2019-b1de72b00b
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU22742
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2019-17053
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to the ieee802154_create() function in net/ieee802154/socket.c in the AF_IEEE802154 network module for the Linux kernel does not enforce CAP_NET_RAW when creating raw sockets. A local unprivileged user can create raw sockets on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsFedora: 31
kernel-tools: before 5.3.4-300.fc31
kernel-headers: before 5.3.4-300.fc31
kernel: before 5.3.4-300.fc31
CPE2.3https://bodhi.fedoraproject.org/updates/FEDORA-2019-b1de72b00b
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU22744
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2019-17054
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to the atalk_create() function in net/appletalk/ddp.c in the AF_APPLETALK network module for the Linux kernel does not enforce CAP_NET_RAW when creating raw sockets. A local unprivileged user can create raw sockets on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsFedora: 31
kernel-tools: before 5.3.4-300.fc31
kernel-headers: before 5.3.4-300.fc31
kernel: before 5.3.4-300.fc31
CPE2.3https://bodhi.fedoraproject.org/updates/FEDORA-2019-b1de72b00b
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU22746
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2019-17055
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to the base_sock_create in drivers/isdn/mISDN/socket.c in the AF_ISDN network module for the Linux kernel does not enforce CAP_NET_RAW. A local unprivileged user can create a raw socket.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsFedora: 31
kernel-tools: before 5.3.4-300.fc31
kernel-headers: before 5.3.4-300.fc31
kernel: before 5.3.4-300.fc31
CPE2.3https://bodhi.fedoraproject.org/updates/FEDORA-2019-b1de72b00b
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU22747
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2019-17056
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to the llcp_sock_create() function in net/nfc/llcp_sock.c in the AF_NFC network module for the Linux kernel does not enforce CAP_NET_RAW. A local unprivileged user can create a raw socket.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsFedora: 31
kernel-tools: before 5.3.4-300.fc31
kernel-headers: before 5.3.4-300.fc31
kernel: before 5.3.4-300.fc31
CPE2.3https://bodhi.fedoraproject.org/updates/FEDORA-2019-b1de72b00b
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.