Unrated severityNVD Advisory· Published Apr 11, 2019· Updated Aug 4, 2024
CVE-2019-11190
CVE-2019-11190
Description
The Linux kernel before 4.8 allows local users to bypass ASLR on setuid programs (such as /bin/su) because install_exec_creds() is called too late in load_elf_binary() in fs/binfmt_elf.c, and thus the ptrace_may_access() check has a race condition when reading /proc/pid/stat.
Affected products
66- Range: <4.8
- osv-coords65 versionspkg:rpm/suse/kernel-azure&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3pkg:rpm/suse/kernel-azure&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3pkg:rpm/suse/kernel-bigmem&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSSpkg:rpm/suse/kernel-default&distro=SUSE%20Enterprise%20Storage%204pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP3pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2012%20SP2pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2012%20SP3pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSSpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCLpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSSpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2012%20SP3pkg:rpm/suse/kernel-default&distro=SUSE%20OpenStack%20Cloud%207pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP3pkg:rpm/suse/kernel-ec2&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2012pkg:rpm/suse/kernel-ec2&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSSpkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP3pkg:rpm/suse/kernel-pae&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSSpkg:rpm/suse/kernel-ppc64&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSSpkg:rpm/suse/kernel-source-azure&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3pkg:rpm/suse/kernel-source-azure&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3pkg:rpm/suse/kernel-source&distro=SUSE%20Enterprise%20Storage%204pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP3pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSSpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCLpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSSpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3pkg:rpm/suse/kernel-source&distro=SUSE%20OpenStack%20Cloud%207pkg:rpm/suse/kernel-syms-azure&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3pkg:rpm/suse/kernel-syms-azure&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3pkg:rpm/suse/kernel-syms&distro=SUSE%20Enterprise%20Storage%204pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP3pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSSpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCLpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSSpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3pkg:rpm/suse/kernel-syms&distro=SUSE%20OpenStack%20Cloud%207pkg:rpm/suse/kernel-trace&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSSpkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSSpkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_34&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_34&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_30&distro=SUSE%20Enterprise%20Storage%204pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_30&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_30&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_30&distro=SUSE%20OpenStack%20Cloud%207pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_26&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP3pkg:rpm/suse/kgraft-patch-SLE12_Update_40&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSS
< 4.4.180-4.31.1+ 64 more
- (no CPE)range: < 4.4.180-4.31.1
- (no CPE)range: < 4.4.180-4.31.1
- (no CPE)range: < 3.0.101-108.95.2
- (no CPE)range: < 4.4.121-92.114.1
- (no CPE)range: < 4.4.180-94.97.1
- (no CPE)range: < 4.4.121-92.114.1
- (no CPE)range: < 4.4.180-94.97.1
- (no CPE)range: < 3.0.101-108.95.2
- (no CPE)range: < 3.12.74-60.64.115.1
- (no CPE)range: < 4.4.121-92.114.1
- (no CPE)range: < 4.4.121-92.114.1
- (no CPE)range: < 4.4.180-94.97.1
- (no CPE)range: < 3.12.61-52.154.1
- (no CPE)range: < 3.12.74-60.64.115.1
- (no CPE)range: < 4.4.121-92.114.1
- (no CPE)range: < 4.4.180-94.97.1
- (no CPE)range: < 4.4.180-94.97.1
- (no CPE)range: < 4.4.121-92.114.1
- (no CPE)range: < 4.4.180-94.97.1
- (no CPE)range: < 3.12.74-60.64.115.1
- (no CPE)range: < 3.0.101-108.95.2
- (no CPE)range: < 4.4.180-94.97.1
- (no CPE)range: < 3.0.101-108.95.2
- (no CPE)range: < 3.0.101-108.95.2
- (no CPE)range: < 4.4.180-4.31.1
- (no CPE)range: < 4.4.180-4.31.1
- (no CPE)range: < 4.4.121-92.114.1
- (no CPE)range: < 4.4.180-94.97.1
- (no CPE)range: < 3.0.101-108.95.1
- (no CPE)range: < 3.12.74-60.64.115.1
- (no CPE)range: < 4.4.121-92.114.1
- (no CPE)range: < 4.4.121-92.114.1
- (no CPE)range: < 4.4.180-94.97.1
- (no CPE)range: < 3.12.61-52.154.1
- (no CPE)range: < 3.12.74-60.64.115.1
- (no CPE)range: < 4.4.121-92.114.1
- (no CPE)range: < 4.4.180-94.97.1
- (no CPE)range: < 4.4.121-92.114.1
- (no CPE)range: < 4.4.180-4.31.1
- (no CPE)range: < 4.4.180-4.31.1
- (no CPE)range: < 4.4.121-92.114.1
- (no CPE)range: < 4.4.180-94.97.1
- (no CPE)range: < 3.0.101-108.95.1
- (no CPE)range: < 3.12.74-60.64.115.1
- (no CPE)range: < 4.4.121-92.114.1
- (no CPE)range: < 4.4.121-92.114.1
- (no CPE)range: < 4.4.180-94.97.1
- (no CPE)range: < 3.12.61-52.154.1
- (no CPE)range: < 3.12.74-60.64.115.1
- (no CPE)range: < 4.4.121-92.114.1
- (no CPE)range: < 4.4.180-94.97.1
- (no CPE)range: < 4.4.121-92.114.1
- (no CPE)range: < 3.0.101-108.95.2
- (no CPE)range: < 3.0.101-108.95.2
- (no CPE)range: < 3.12.74-60.64.115.1
- (no CPE)range: < 3.12.61-52.154.1
- (no CPE)range: < 3.12.74-60.64.115.1
- (no CPE)range: < 1-2.5.1
- (no CPE)range: < 1-2.5.1
- (no CPE)range: < 1-3.5.1
- (no CPE)range: < 1-3.5.1
- (no CPE)range: < 1-3.5.1
- (no CPE)range: < 1-3.5.1
- (no CPE)range: < 1-4.3.3
- (no CPE)range: < 1-1.5.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
12- lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.htmlmitrevendor-advisoryx_refsource_SUSE
- usn.ubuntu.com/4008-1/mitrevendor-advisoryx_refsource_UBUNTU
- usn.ubuntu.com/4008-2/mitrevendor-advisoryx_refsource_UBUNTU
- usn.ubuntu.com/4008-3/mitrevendor-advisoryx_refsource_UBUNTU
- www.openwall.com/lists/oss-security/2019/04/15/1mitremailing-listx_refsource_MLIST
- www.securityfocus.com/bid/107890mitrevdb-entryx_refsource_BID
- git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/commit/mitrex_refsource_MISC
- git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/commit/mitrex_refsource_MISC
- lists.debian.org/debian-lts-announce/2019/05/msg00041.htmlmitremailing-listx_refsource_MLIST
- lists.debian.org/debian-lts-announce/2019/05/msg00042.htmlmitremailing-listx_refsource_MLIST
- www.openwall.com/lists/oss-security/2019/04/03/4mitrex_refsource_MISC
- www.openwall.com/lists/oss-security/2019/04/03/4/1mitrex_refsource_MISC
News mentions
0No linked articles in our index yet.