First published: Tue Aug 27 2019(Updated: )
A flaw regarding the removal of xfrm policies from the kernel may possibly crash the system or corrupt memory or escalate privilges . Policies addition or removal is a privileged operation (usually done through the ip command) or via a netlink socket. A local privileged user (with CAP_NET_ADMIN or root) is required to exploit this condition. With this limitation, this issue is rated as Moderate. Reference: <a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b805d78d300bcf2c83d6df7da0c818b0fee41427">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b805d78d300bcf2c83d6df7da0c818b0fee41427</a> <a href="https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.19">https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.19</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-alt | <0:4.14.0-115.19.1.el7a | 0:4.14.0-115.19.1.el7a |
redhat/kernel-rt | <0:4.18.0-147.rt24.93.el8 | 0:4.18.0-147.rt24.93.el8 |
redhat/kernel | <0:4.18.0-147.el8 | 0:4.18.0-147.el8 |
Linux Kernel | <5.0.19 | |
Debian | =8.0 | |
SUSE Linux | =15.0 | |
SUSE Linux | =15.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2019-15666 is considered a moderate severity vulnerability due to its potential to crash the system or escalate privileges.
You can fix CVE-2019-15666 by upgrading to the appropriate kernel versions specified by Red Hat or other affected distributions.
Local privileged users on systems using the affected kernels, such as certain Red Hat and Debian versions, may be impacted by CVE-2019-15666.
CVE-2019-15666 involves vulnerabilities related to the management of xfrm policies in the Linux kernel.
Yes, CVE-2019-15666 may potentially cause a system crash if exploited by a local privileged user.