CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
32.1%
In the Linux kernel through 4.20.11, af_alg_release() in crypto/af_alg.c
neglects to set a NULL value for a certain structure member, which leads to
a use-after-free in sockfs_setattr.
Author | Note |
---|---|
tyhicks | NVD has published CVSS metrics that state that the attack vector is βNetworkβ which results in a CRITICAL CVSS score but that does not match Ubuntuβs assessment. The attack vector is βLocalβ since AF_ALG is a address family that strictly operates locally between a userspace process and the kernel crypto API and the attack requires a specific sequence of operations to be performed on the file descriptor that represents the socket. This has been addressed in a more generic manner, to fix other network families, by this commit in the net tree: https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=ff7b11aa481f682e0e9711abfeb7d03f5cd612bf |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux | <Β 4.15.0-47.50 | UNKNOWN |
ubuntu | 18.10 | noarch | linux | <Β 4.18.0-17.18 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | <Β 4.15.0-1035.37 | UNKNOWN |
ubuntu | 18.10 | noarch | linux-aws | <Β 4.18.0-1012.14 | UNKNOWN |
ubuntu | 16.04 | noarch | linux-aws-hwe | <Β 4.15.0-1035.37~16.04.1 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-azure | <Β 4.18.0-1014.14~18.04.1 | UNKNOWN |
ubuntu | 18.10 | noarch | linux-azure | <Β 4.18.0-1014.14 | UNKNOWN |
ubuntu | 14.04 | noarch | linux-azure | <Β 4.15.0-1041.45~14.04.1 | UNKNOWN |
ubuntu | 16.04 | noarch | linux-azure | <Β 4.15.0-1041.45 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-azure-edge | <Β 4.18.0-1014.14~18.04.1 | UNKNOWN |
launchpad.net/bugs/cve/CVE-2019-8912
nvd.nist.gov/vuln/detail/CVE-2019-8912
security-tracker.debian.org/tracker/CVE-2019-8912
ubuntu.com/security/notices/USN-3930-1
ubuntu.com/security/notices/USN-3930-2
ubuntu.com/security/notices/USN-3931-1
ubuntu.com/security/notices/USN-3931-2
www.cve.org/CVERecord?id=CVE-2019-8912
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
32.1%