First published: Fri Sep 20 2019(Updated: )
A vulnerability was found in base_sock_create in drivers/isdn/mISDN/socket.c in the AF_ISDN network module in the Linux kernel does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket. Reference: <a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b91ee4aa2a2199ba4d4650706c272985a5a32d80">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b91ee4aa2a2199ba4d4650706c272985a5a32d80</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <0:2.6.32-754.28.1.el6 | 0:2.6.32-754.28.1.el6 |
redhat/kernel-rt | <0:3.10.0-1160.rt56.1131.el7 | 0:3.10.0-1160.rt56.1131.el7 |
redhat/kernel | <0:3.10.0-1160.el7 | 0:3.10.0-1160.el7 |
redhat/kernel-rt | <0:4.18.0-193.rt13.51.el8 | 0:4.18.0-193.rt13.51.el8 |
redhat/kernel | <0:4.18.0-193.el8 | 0:4.18.0-193.el8 |
Linux Kernel | <=5.3.2 | |
Debian Linux | =8.0 | |
Red Hat Fedora | =29 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =19.04 | |
SUSE Linux | =15.0 | |
SUSE Linux | =15.1 | |
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Workstation | =6.0 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.128-1 6.12.20-1 6.12.21-1 |
At this time the only known way to 'mitigate' this flaw is to blacklist the kernel module from being loaded. Creating raw sockets with this protocol is a method of communicating with ISDN hardware, a technology that is becoming less and less common. Check https://access.redhat.com/solutions/41278 for instructions on how to disable the mISDN_core.ko module.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2019-17055 is classified as a medium severity vulnerability due to its potential exploitation by unprivileged users.
To fix CVE-2019-17055, upgrade to the recommended kernel versions provided by your Linux distribution, such as Red Hat or Debian.
CVE-2019-17055 affects Linux kernel versions up to 5.3.2 and various distributions, including Red Hat, Debian, and Ubuntu.
CVE-2019-17055 is not considered remotely exploitable as it requires local access to the system.
The impact of CVE-2019-17055 allows unprivileged users to create raw sockets, which could facilitate further attacks on the system.