CVE-2019-9213
Linux < 4.20.14 - Virtual Address 0 is Mappable via Privileged write() to /proc/*/mem
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
4Exploited in Wild
-Decision
Descriptions
In the Linux kernel before 4.20.14, expand_downwards in mm/mmap.c lacks a check for the mmap minimum address, which makes it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task.
En el kernel de Linux, en versiones anteriores a la 4.20.14, expand_downwards en mm/mmap.c carece de una comprobación para la dirección mínima de mmap, lo que facilita que los atacantes exploten desreferencias de puntero NULL en el kernel en plataformas que no son SMAP. Esto esto está relacionado con una comprobación de capacidades para la tarea equivocada.
A flaw was found in mmap in the Linux kernel allowing the process to map a null page. This allows attackers to abuse this mechanism to turn null pointer dereferences into workable exploits.
It was discovered that virtual address 0 is mappable via privileged write() to /proc/*/mem on Linux.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2019-02-27 CVE Reserved
- 2019-03-05 CVE Published
- 2020-01-23 First Exploit
- 2024-02-27 EPSS Updated
- 2024-08-04 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-476: NULL Pointer Dereference
CAPEC
References (29)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/107296 | Third Party Advisory | |
https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html | Mailing List | |
https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html | Mailing List | |
https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html | Mailing List |
URL | Date | SRC |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00045.html | 2022-10-12 | |
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00052.html | 2022-10-12 | |
https://access.redhat.com/errata/RHSA-2019:0831 | 2022-10-12 | |
https://access.redhat.com/errata/RHSA-2019:1479 | 2022-10-12 | |
https://access.redhat.com/errata/RHSA-2019:1480 | 2022-10-12 | |
https://usn.ubuntu.com/3930-1 | 2022-10-12 | |
https://usn.ubuntu.com/3930-2 | 2022-10-12 | |
https://usn.ubuntu.com/3931-1 | 2022-10-12 | |
https://usn.ubuntu.com/3931-2 | 2022-10-12 | |
https://usn.ubuntu.com/3932-1 | 2022-10-12 | |
https://usn.ubuntu.com/3932-2 | 2022-10-12 | |
https://usn.ubuntu.com/3933-1 | 2022-10-12 | |
https://usn.ubuntu.com/3933-2 | 2022-10-12 | |
https://access.redhat.com/security/cve/CVE-2019-9213 | 2019-06-17 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1686136 | 2019-06-17 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 4.9 < 4.9.162 Search vendor "Linux" for product "Linux Kernel" and version " >= 4.9 < 4.9.162" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 4.14 < 4.14.105 Search vendor "Linux" for product "Linux Kernel" and version " >= 4.14 < 4.14.105" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 4.19 < 4.19.27 Search vendor "Linux" for product "Linux Kernel" and version " >= 4.19 < 4.19.27" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 4.20 < 4.20.14 Search vendor "Linux" for product "Linux Kernel" and version " >= 4.20 < 4.20.14" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 8.0 Search vendor "Debian" for product "Debian Linux" and version "8.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Search vendor "Redhat" for product "Enterprise Linux" | 7.0 Search vendor "Redhat" for product "Enterprise Linux" and version "7.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Search vendor "Redhat" for product "Enterprise Linux" | 8.0 Search vendor "Redhat" for product "Enterprise Linux" and version "8.0" | - |
Affected
| ||||||
Opensuse Search vendor "Opensuse" | Leap Search vendor "Opensuse" for product "Leap" | 15.0 Search vendor "Opensuse" for product "Leap" and version "15.0" | - |
Affected
| ||||||
Opensuse Search vendor "Opensuse" | Leap Search vendor "Opensuse" for product "Leap" | 42.3 Search vendor "Opensuse" for product "Leap" and version "42.3" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 12.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "12.04" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 14.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "14.04" | esm |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 16.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "16.04" | esm |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 18.10 Search vendor "Canonical" for product "Ubuntu Linux" and version "18.10" | - |
Affected
|