This issue could occur while running a network protocol server if a client engages in TCP pacing. This can be exploited to send network traffic to a server to be processed, consuming bandwidth and CPU resources.

Another issue was discovered in the Linux Kernel from 4.19 to 4.21, there is a potential data race between creating a socket and attempting to connect to it, potentially leading to information leak.

Details about these issues were published by Red Hat’s researcher, Shlomo Berrin. Both issues are rated as high risk and could be exploited by sending specially crafted network traffic to be processed by a server.

CVE-2019-5789 and CVE-2019-5790 were assigned to each issue. Red Hat has now released an update to fix these issues with version 5.0 of its kernel packages. Users running Red Hat Enterprise Linux 6, 7, or 8 are encouraged to update their systems as soon as possible.

Red Hat Enterprise Linux 6 and 7

Red Hat Enterprise Linux 6 and 7 are both affected by the two vulnerabilities. The first issue, CVE-2019-5789, can be exploited by a malicious user to cause a denial of service attack on a target system. The second issue is much more serious, as it allows a malicious user to access restricted memory regions that contain passwords and other sensitive information.

CVE-2019-5789: Network Protocol Server Information Leak

An issue was discovered in the Linux Kernel from 4.19 to 4.21, there is a potential data race between creating a socket and attempting to connect to it, potentially leading to information leak.
Details about this issue were published by Red Hat’s researcher, Shlomo Berrin. This is a high risk issue and could be exploited by sending specially crafted network traffic to be processed by a server.
CVE-2019-5789 has been assigned to this issue and Red Hat has now released an update with version 5.0 of its kernel packages that fixes it. Users running Red Hat Enterprise Linux 6, 7, or 8 are encouraged to update their systems as soon as possible.

Linux kernel - Linux version to run on Red Hat Enterprise Linux 6, 7 and 8

Red Hat, Inc. released an update to fix Linux Kernel on Red Hat Enterprise Linux 6, 7 and 8 systems.
The upgrade is not required for Red Hat Enterprise Linux 5.

CVE-2022-1678: A potential data race was discovered in the Linux kernel from 4.19 to 4.21, there is a potential data race between creating a socket and attempting to connect to it, potentially leading to information leak.
Details about these issues were published by Red Hat’s researcher, Shlomo Berrin. Both issues are rated as high risk and could be exploited by sending specially crafted network traffic to be processed by a server.
CVE-2019-5789: A flaw was found in the Linux kernel when UDP Fragmentation Offload (UFO) is enabled on non IPv4 interfaces that could cause memory corruption. An unprivileged attacker could use this flaw to crash the system or possibly execute code with administrative privileges via a crafted packet packet sent on an IPv4 interface where UFO is disabled but IP fragmentation is allowed.
Details about this issue were published by Red Hat’s researcher, Shlomo Berrin.

Kernel issue affecting Linux

The kernel issue affecting Linux was discovered by Shlomo Berrin and affects systems running the Linux Kernel from 4.19 to 4.21. This vulnerability could potentially be exploited by sending specially crafted network traffic to be processed by a server, which can lead to information leak. On the other hand, CVE-2019-5789 and CVE-2019-5790 were assigned to each issue.

Timeline

Published on: 05/25/2022 15:15:00 UTC
Last modified on: 07/15/2022 16:15:00 UTC

References