7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
4.6 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:P/A:P
0.001 Low
EPSS
Percentile
32.9%
In the Linux kernel before 5.4.2, the io_uring feature leads to requests
that inadvertently have UID 0 and full capabilities, aka CID-181e448d8709.
This is related to fs/io-wq.c, fs/io_uring.c, and net/socket.c. For
example, an attacker can bypass intended restrictions on adding an IPv4
address to the loopback interface. This occurs because IORING_OP_SENDMSG
operations, although requested in the context of an unprivileged user, are
sometimes performed by a kernel worker thread without considering that
context.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 19.10 | noarch | linux | < 5.3.0-40.32 | UNKNOWN |
ubuntu | 19.10 | noarch | linux-azure | < 5.3.0-1013.14 | UNKNOWN |
ubuntu | 19.10 | noarch | linux-aws | < 5.3.0-1011.12 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-azure-5.3 | < 5.3.0-1013.14~18.04.1 | UNKNOWN |
ubuntu | 19.10 | noarch | linux-gcp | < 5.3.0-1012.13 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-gcp-5.3 | < 5.3.0-1012.13~18.04.1 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-gke-5.3 | < 5.3.0-1012.13~18.04.1 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-hwe | < 5.3.0-40.32~18.04.1 | UNKNOWN |
ubuntu | 19.10 | noarch | linux-kvm | < 5.3.0-1010.11 | UNKNOWN |
ubuntu | 19.10 | noarch | linux-oracle | < 5.3.0-1009.10 | UNKNOWN |
bugs.chromium.org/p/project-zero/issues/detail?id=1975
cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.2
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19241
git.kernel.org/linus/181e448d8709e517c9c7b523fcd209f24eb38ca7
git.kernel.org/linus/d69e07793f891524c6bbf1e75b9ae69db4450953
git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=181e448d8709e517c9c7b523fcd209f24eb38ca7
git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d69e07793f891524c6bbf1e75b9ae69db4450953
launchpad.net/bugs/cve/CVE-2019-19241
nvd.nist.gov/vuln/detail/CVE-2019-19241
security-tracker.debian.org/tracker/CVE-2019-19241
ubuntu.com/security/notices/USN-4284-1
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
4.6 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:P/A:P
0.001 Low
EPSS
Percentile
32.9%