First published: Tue Apr 28 2020(Updated: )
In FreeBSD 12.1-STABLE before r356089, 12.1-RELEASE before 12.1-RELEASE-p3, 11.3-STABLE before r356090, and 11.3-RELEASE before 11.3-RELEASE-p7, driver specific ioctl command handlers in the oce network driver failed to check whether the caller has sufficient privileges allowing unprivileged users to send passthrough commands to the device firmware.
Credit: secteam@freebsd.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD Kernel | =11.3 | |
FreeBSD Kernel | =11.3-p1 | |
FreeBSD Kernel | =11.3-p2 | |
FreeBSD Kernel | =11.3-p3 | |
FreeBSD Kernel | =11.3-p4 | |
FreeBSD Kernel | =11.3-p5 | |
FreeBSD Kernel | =11.3-p6 | |
FreeBSD Kernel | =12.1 | |
FreeBSD Kernel | =12.1-p1 | |
FreeBSD Kernel | =12.1-p2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-15876 has a medium severity rating due to insufficient privilege checks in specific ioctl command handlers within the oce network driver.
To mitigate CVE-2019-15876, upgrade your FreeBSD installation to version 12.1-RELEASE-p3 or later, or a patched version of 11.3.
CVE-2019-15876 affects FreeBSD versions 12.1-STABLE prior to r356089, 12.1-RELEASE before 12.1-RELEASE-p3, and 11.3-STABLE prior to r356090.
Unprivileged users on affected FreeBSD systems could exploit CVE-2019-15876 to gain unauthorized access through the oce network driver.
Failure to address CVE-2019-15876 may allow unprivileged users to execute potentially harmful operations on the affected FreeBSD systems.