A flaw regarding the removal of xfrm policies from the kernel may possibly crash the system or corrupt memory or escalate privilges . Policies addition or removal is a privileged operation (usually done through the ip command) or via a netlink socket. A local privileged user (with CAP_NET_ADMIN or root) is required to exploit this condition. With this limitation, this issue is rated as Moderate. Reference: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b805d78d300bcf2c83d6df7da0c818b0fee41427 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.19
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1747335]
This was fixed for Fedora with the 5.0.19 stable update
Statement: A local privileged user (with CAP_NET_ADMIN or root) is required to exploit this condition. With this limitation, this issue is rated as Moderate.
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2020:1493 https://access.redhat.com/errata/RHSA-2020:1493
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2019-15666