Vulnerability Description
An exploitable vulnerability exists in the grsecurity PaX patch for the function read_kmem, in PaX from version pax-linux-4.9.8-test1 to 4.9.24-test7, grsecurity official from version grsecurity-3.1-4.9.8-201702060653 to grsecurity-3.1-4.9.24-201704252333, grsecurity unofficial from version v4.9.25-unofficialgrsec to v4.9.74-unofficialgrsec. PaX adds a temp buffer to the read_kmem function, which is never freed when an invalid address is supplied. This results in a memory leakage that can lead to a crash of the system. An attacker needs to induce a read to /dev/kmem using an invalid address to exploit this vulnerability.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Opensrcsec | Grsecurity | >= 3.1-4.9.8-201702060653, <= 3.1-4.9.24-201704252333 |
| Opensrcsec | Pax | >= pax-linux-4.9.8-test1, <= pax-linux-4.9.8-test7 |
Related Weaknesses (CWE)
References
- https://talosintelligence.com/vulnerability_reports/TALOS-2019-0784ExploitThird Party Advisory
- https://talosintelligence.com/vulnerability_reports/TALOS-2019-0784ExploitThird Party Advisory
FAQ
What is CVE-2019-5023?
CVE-2019-5023 is a vulnerability with a CVSS score of 5.9 (MEDIUM). An exploitable vulnerability exists in the grsecurity PaX patch for the function read_kmem, in PaX from version pax-linux-4.9.8-test1 to 4.9.24-test7, grsecurity official from version grsecurity-3.1-4...
How severe is CVE-2019-5023?
CVE-2019-5023 has been rated MEDIUM with a CVSS base score of 5.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-5023?
Check the references section above for vendor advisories and patch information. Affected products include: Opensrcsec Grsecurity, Opensrcsec Pax.