CVE-2019-17055

base_sock_create in drivers/isdn/mISDN/socket.c in the AF_ISDN network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-b91ee4aa2a21.
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*

Configuration 6 (hide)

OR cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*

History

07 Nov 2023, 03:06

Type Values Removed Values Added
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6JNEWGIK7QA24OIUUL67QZNJN52NB7T/', 'name': 'FEDORA-2019-41e28660ae', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6JNEWGIK7QA24OIUUL67QZNJN52NB7T/ -

31 Mar 2022, 18:13

Type Values Removed Values Added
CWE CWE-20 CWE-862
First Time Debian debian Linux
Fedoraproject
Redhat enterprise Linux Desktop
Redhat enterprise Linux Server
Debian
Opensuse leap
Canonical ubuntu Linux
Redhat enterprise Linux Workstation
Fedoraproject fedora
Canonical
Opensuse
Redhat
CPE cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
References (MISC) http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html - (MISC) http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html - Third Party Advisory, VDB Entry
References (REDHAT) https://access.redhat.com/errata/RHSA-2020:0790 - (REDHAT) https://access.redhat.com/errata/RHSA-2020:0790 - Third Party Advisory
References (UBUNTU) https://usn.ubuntu.com/4186-2/ - (UBUNTU) https://usn.ubuntu.com/4186-2/ - Third Party Advisory
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00039.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00039.html - Mailing List, Third Party Advisory
References (UBUNTU) https://usn.ubuntu.com/4185-1/ - (UBUNTU) https://usn.ubuntu.com/4185-1/ - Third Party Advisory
References (MLIST) https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html - (MLIST) https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html - Mailing List, Third Party Advisory
References (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6JNEWGIK7QA24OIUUL67QZNJN52NB7T/ - (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6JNEWGIK7QA24OIUUL67QZNJN52NB7T/ - Mailing List, Third Party Advisory
References (UBUNTU) https://usn.ubuntu.com/4186-1/ - (UBUNTU) https://usn.ubuntu.com/4186-1/ - Third Party Advisory
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html - Mailing List, Third Party Advisory
References (BUGTRAQ) https://seclists.org/bugtraq/2019/Nov/11 - (BUGTRAQ) https://seclists.org/bugtraq/2019/Nov/11 - Mailing List, Third Party Advisory
References (UBUNTU) https://usn.ubuntu.com/4185-2/ - (UBUNTU) https://usn.ubuntu.com/4185-2/ - Third Party Advisory
References (UBUNTU) https://usn.ubuntu.com/4184-1/ - (UBUNTU) https://usn.ubuntu.com/4184-1/ - Third Party Advisory
References (MLIST) https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html - (MLIST) https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html - Mailing List, Third Party Advisory

Information

Published : 2019-10-01 14:15

Updated : 2023-12-10 13:13


NVD link : CVE-2019-17055

Mitre link : CVE-2019-17055

CVE.ORG link : CVE-2019-17055


JSON object : View

Products Affected

redhat

  • enterprise_linux_server
  • enterprise_linux_desktop
  • enterprise_linux_workstation

canonical

  • ubuntu_linux

debian

  • debian_linux

opensuse

  • leap

fedoraproject

  • fedora

linux

  • linux_kernel
CWE
CWE-862

Missing Authorization