In FreeBSD 11.2-STABLE after r338618 and before r343786, 12.0-STABLE before r343781, and 12.0-RELEASE before 12.0-RELEASE-p3, a bug in the reference count implementation for UNIX domain sockets can cause a file structure to be incorrectly released potentially allowing a malicious local user to gain root privileges or escape from a jail.
References
Link | Resource |
---|---|
https://security.FreeBSD.org/advisories/FreeBSD-SA-19:02.fd.asc | Patch Third Party Advisory |
http://packetstormsecurity.com/files/155790/FreeBSD-fd-Privilege-Escalation.html |
Configurations
Configuration 1 (hide)
|
Information
Published : 2019-02-11 21:29
Updated : 2020-08-24 10:37
NVD link : CVE-2019-5596
Mitre link : CVE-2019-5596
JSON object : View
CWE
Products Affected
freebsd
- freebsd