7.8 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:N/I:N/A:C
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
0.002 Low
EPSS
Percentile
64.9%
An issue was discovered in the Linux kernel 4.4.x before 4.4.195. There is
a NULL pointer dereference in rds_tcp_kill_sock() in net/rds/tcp.c that
will cause denial of service, aka CID-91573ae4aed0.
Author | Note |
---|---|
PHLin | this patch was targeted for 4.4 only, from the author’s comment: Upstream does not use tc->t_sock in the second loop after below two patches. afb4164d91c7 (“RDS: TCP: Refactor connection destruction to handle multiple paths”) and 2d746c93b6e5 (“rds: tcp: remove redundant function rds_tcp_conn_paths_destroy()”) |
cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.195
git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=91573ae4aed0a49660abdad4d42f2a0db995ee5e
github.com/torvalds/linux/commit/91573ae4aed0a49660abdad4d42f2a0db995ee5e
launchpad.net/bugs/cve/CVE-2019-18680
lkml.org/lkml/2019/9/18/337
nvd.nist.gov/vuln/detail/CVE-2019-18680
security-tracker.debian.org/tracker/CVE-2019-18680
www.cve.org/CVERecord?id=CVE-2019-18680
7.8 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:N/I:N/A:C
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
0.002 Low
EPSS
Percentile
64.9%