First published: Fri Feb 15 2019(Updated: )
In the Linux kernel af_alg_release() in crypto/af_alg.c neglects to set a NULL value for a certain structure member, which leads to a use-after-free (UAF) in sockfs_setattr. A local attacker can use this flaw to escalate privileges and take control of the system. Other vendors have considered this a 'network' accessible attack, this claim is unsubstantiated at this time. Note: The attack vector that allowed the use-after-free mentioned in the original report is not introduced in the Red Hat Enterprise Linux 7, 6 and 5 versions of the kernel. References: <a href="http://patchwork.ozlabs.org/patch/1042902/">http://patchwork.ozlabs.org/patch/1042902/</a> An upstream patch: <a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9060cb719e61b685ec0102574e10337fa5f445ea">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9060cb719e61b685ec0102574e10337fa5f445ea</a>
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-alt | <0:4.14.0-115.17.1.el7a | 0:4.14.0-115.17.1.el7a |
Linux Kernel | >=4.10<4.14.103 | |
Linux Kernel | >=4.19<4.19.25 | |
Linux Kernel | >=4.20<4.20.12 | |
Linux Kernel | =5.0-rc1 | |
Linux Kernel | =5.0-rc2 | |
Linux Kernel | =5.0-rc3 | |
Linux Kernel | =5.0-rc4 | |
Linux Kernel | =5.0-rc5 | |
Linux Kernel | =5.0-rc6 | |
Linux Kernel | =5.0-rc7 | |
Linux Kernel | =5.0-rc8 | |
Red Hat Enterprise Linux | =7.0 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =18.10 | |
SUSE Linux | =15.0 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.17-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-8912 has a high severity rating as it allows local attackers to escalate privileges.
To mitigate CVE-2019-8912, update to the appropriate kernel version that contains the fix, such as 5.10.223-1 or later.
CVE-2019-8912 affects various Linux kernel versions including those up to 5.0-rc8 and specific distributions like Red Hat and Ubuntu.
No, CVE-2019-8912 can only be exploited by local attackers with access to the system.
There are no specific workarounds for CVE-2019-8912, so applying the latest updates is recommended.