First published: Fri Jul 26 2019(Updated: )
In FreeBSD 12.0-STABLE before r350222, 12.0-RELEASE before 12.0-RELEASE-p8, 11.3-STABLE before r350223, 11.3-RELEASE before 11.3-RELEASE-p1, and 11.2-RELEASE before 11.2-RELEASE-p12, rights transmitted over a domain socket did not properly release a reference on transmission error allowing a malicious user to cause the reference counter to wrap, forcing a free event. This could allow a malicious local user to gain root privileges or escape from a jail.
Credit: secteam@freebsd.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD Kernel | =11.0 | |
FreeBSD Kernel | =11.2 | |
FreeBSD Kernel | =11.3 | |
FreeBSD Kernel | =12.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-5607 has a medium severity rating due to potential rights escalation through domain socket transmission errors.
To fix CVE-2019-5607, users should update to FreeBSD versions 12.0-RELEASE-p8, 11.3-RELEASE-p1, or 11.2-RELEASE-p12 or later.
CVE-2019-5607 affects FreeBSD versions 11.0, 11.2, 11.3, and 12.0 prior to their respective patches.
CVE-2019-5607 is a rights management vulnerability that allows unauthorized escalation through improper handling of domain socket operations.
There is no documented workaround for CVE-2019-5607; applying the appropriate updates is recommended.