#VU20908 Use-after-free in Linux kernel - CVE-2019-15239
Published: September 6, 2019 / Updated: September 6, 2019
Linux kernel
Linux Foundation
Description
The vulnerability allows a local user to cause a denial of service (DoS) condition on a target system.
The vulnerability exists due to multiple use-after-free conditions that exists because of a change to the "net/ipv4/tcp_output.c" file, which was incorrectly backported to earlier long-term versions. A local authenticated user can access the system, execute an application that submits malicious input and crash the software, resulting in a DoS condition.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
Remediation
External links
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7f582b248d0a86bae5788c548d7bb5bca6f7691a
- https://lore.kernel.org/stable/41a61a2f87691d2bc839f26cdfe6f5ff2f51e472.camel@decadent.org.uk/
- https://pulsesecurity.co.nz/advisories/linux-kernel-4.9-tcpsocketsuaf
- https://salsa.debian.org/kernel-team/kernel-sec/blob/f6273af2d956a87296b6b60379d0a186c9be4bbc/active/CVE-2019-15239
- https://www.debian.org/security/2019/dsa-4497