CVE-2019-18680

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

An issue was discovered in the Linux kernel 4.4.x before 4.4.195. There is a NULL pointer dereference in rds_tcp_kill_sock() in net/rds/tcp.c that will cause denial of service, aka CID-91573ae4aed0.

References

https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.195

https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=91573ae4aed0a49660abdad4d42f2a0db995ee5e

https://github.com/torvalds/linux/commit/91573ae4aed0a49660abdad4d42f2a0db995ee5e

https://lkml.org/lkml/2019/9/18/337

https://security.netapp.com/advisory/ntap-20191205-0001/

Details

Source: MITRE

Published: 2019-11-04

Updated: 2019-12-05

Type: CWE-476

Risk Information

CVSS v2

Base Score: 7.8

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C

Impact Score: 6.9

Exploitability Score: 10

Severity: HIGH

CVSS v3

Base Score: 7.5

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Impact Score: 3.6

Exploitability Score: 3.9

Severity: HIGH

Vulnerable Software

Configuration 1

OR

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Tenable Plugins

View all (4 total)

IDNameProductFamilySeverity
140381SUSE SLES12 Security Update : kernel (SUSE-SU-2020:2497-1)NessusSuSE Local Security Checks
critical
140379SUSE SLES12 Security Update : kernel (SUSE-SU-2020:2491-1)NessusSuSE Local Security Checks
critical
132390SUSE SLES12 Security Update : kernel (SUSE-SU-2019:3379-1)NessusSuSE Local Security Checks
critical
131120SUSE SLES12 Security Update : kernel (SUSE-SU-2019:2984-1)NessusSuSE Local Security Checks
critical