CVE-2019-11599
Linux - Missing Locking Between ELF coredump code and userfaultfd VMA Modification
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
4Exploited in Wild
-Decision
Descriptions
The coredump implementation in the Linux kernel before 5.0.10 does not use locking or other mechanisms to prevent vma layout or vma flags changes while it runs, which allows local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition with mmget_not_zero or get_task_mm calls. This is related to fs/userfaultfd.c, mm/mmap.c, fs/proc/task_mmu.c, and drivers/infiniband/core/uverbs_main.c.
La implementación del coredump en el kernel de Linux en versiones anteriores a 5.0.10, no utiliza mecanismos de bloqueo u otros mecanismos para evitar cambios en el layout de vma o en los flags vma mientras se ejecuta, lo que permite a los usuarios locales obtener información sensible, causar una denegación de servicio o posiblemente tener otro impacto no especificado al activar una condición de carrera con llamadas mmget_not_zero o get_task_mm. Esto está relacionado con fs/userfaultfd.c, mm/mmap.c, fs/proc/task_mmu.c, y drivers/infiniband/core/uverbs_main.c
A flaw was found in the Linux kernel where the coredump implementation does not use locking or other mechanisms to prevent vma layout or vma flags changes while it runs. This allows local users to obtain sensitive information, cause a denial of service (DoS), or possibly have unspecified other impact by triggering a race condition with mmget_not_zero or get_task_mm calls.
Linux suffers from a missing locking between ELF coredump code and userfaultfd VMA modification.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2019-04-29 CVE Reserved
- 2019-04-29 CVE Published
- 2024-02-16 EPSS Updated
- 2024-08-04 CVE Updated
- 2024-08-04 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-667: Improper Locking
CAPEC
References (41)
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/46781 | 2024-08-04 | |
http://packetstormsecurity.com/files/152663/Linux-Missing-Lockdown.html | 2024-08-04 | |
https://bugs.chromium.org/p/project-zero/issues/detail?id=1790 | 2024-08-04 | |
https://lists.debian.org/debian-lts-announce/2019/05/msg00041.html | 2024-08-04 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 2.16.12 < 3.16.66 Search vendor "Linux" for product "Linux Kernel" and version " >= 2.16.12 < 3.16.66" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 3.17 < 4.4.183 Search vendor "Linux" for product "Linux Kernel" and version " >= 3.17 < 4.4.183" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 4.5 < 4.9.188 Search vendor "Linux" for product "Linux Kernel" and version " >= 4.5 < 4.9.188" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 4.10 < 4.14.114 Search vendor "Linux" for product "Linux Kernel" and version " >= 4.10 < 4.14.114" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 4.15 < 4.19.37 Search vendor "Linux" for product "Linux Kernel" and version " >= 4.15 < 4.19.37" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 4.20 < 5.0.10 Search vendor "Linux" for product "Linux Kernel" and version " >= 4.20 < 5.0.10" | - |
Affected
|