CVE-2019-6974
Published at:
-
15-02-2019 04:29
Last modified:
-
26-10-2022 01:44
Total changes:
-
5
Description
Common Vulnerability Scoring System (CVSS)
High
Attack complexity
Network
Attack vector
High
Availability
High
Confidentiality
High
Integrity
None
Privileges required
Unchanged
Scope
None
User interaction
8.1
Base score
2.2
5.9
Exploitability score
Impact score
Verification logic
Reference
- https://github.com/torvalds/linux/commit/cfa39381173d5f969daf43582c95ad679189cbc9
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.156
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.8
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.21
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.99
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1765
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cfa39381173d5f969daf43582c95ad679189cbc9
- 46388-Exploit, Third Party Advisory, VDB Entry
- 107127-Broken Link
- [debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update-Mailing List, Third Party Advisory
- [debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update-Mailing List, Third Party Advisory
- USN-3933-2-Third Party Advisory
- USN-3932-2-Third Party Advisory
- USN-3932-1-Third Party Advisory
- USN-3931-2-Third Party Advisory
- USN-3931-1-Third Party Advisory
- USN-3930-2-Third Party Advisory
- USN-3930-1-Third Party Advisory
- USN-3933-1-Third Party Advisory
- https://support.f5.com/csp/article/K11186236
- RHSA-2019:0833-Third Party Advisory
- RHSA-2019:0818-Third Party Advisory
- [debian-lts-announce] 20190503 [SECURITY] [DLA 1771-1] linux-4.9 security update-Mailing List, Third Party Advisory
- RHBA-2019:0959-Third Party Advisory
- RHSA-2019:2809-Third Party Advisory
- https://support.f5.com/csp/article/K11186236?utm_source=f5support&utm_medium=RSS
- RHSA-2019:3967-Third Party Advisory
- RHSA-2020:0103-Third Party Advisory
Keywords