Rapid7 Vulnerability & Exploit Database

Ubuntu: (Multiple Advisories) (CVE-2019-11191): Linux kernel vulnerability

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

Ubuntu: (Multiple Advisories) (CVE-2019-11191): Linux kernel vulnerability

Severity
2
CVSS
(AV:L/AC:M/Au:N/C:P/I:N/A:N)
Published
04/11/2019
Created
06/07/2019
Added
06/05/2019
Modified
03/22/2023

Description

** DISPUTED ** The Linux kernel through 5.0.7, when CONFIG_IA32_AOUT is enabled and ia32_aout is loaded, allows local users to bypass ASLR on setuid a.out programs (if any exist) because install_exec_creds() is called too late in load_aout_binary() in fs/binfmt_aout.c, and thus the ptrace_may_access() check has a race condition when reading /proc/pid/stat. NOTE: the software maintainer disputes that this is a vulnerability because ASLR for a.out format executables has never been supported.

Solution(s)

  • ubuntu-upgrade-apparmor-profiles
  • ubuntu-upgrade-linux-image-4-15-0-1014-oracle
  • ubuntu-upgrade-linux-image-4-15-0-1033-gcp
  • ubuntu-upgrade-linux-image-4-15-0-1035-kvm
  • ubuntu-upgrade-linux-image-4-15-0-1037-raspi2
  • ubuntu-upgrade-linux-image-4-15-0-1039-oem
  • ubuntu-upgrade-linux-image-4-15-0-1040-aws
  • ubuntu-upgrade-linux-image-4-15-0-1054-snapdragon
  • ubuntu-upgrade-linux-image-4-15-0-51-generic
  • ubuntu-upgrade-linux-image-4-15-0-51-generic-lpae
  • ubuntu-upgrade-linux-image-4-15-0-51-lowlatency
  • ubuntu-upgrade-linux-image-4-18-0-1012-gcp
  • ubuntu-upgrade-linux-image-4-18-0-1013-kvm
  • ubuntu-upgrade-linux-image-4-18-0-1015-raspi2
  • ubuntu-upgrade-linux-image-4-18-0-1017-aws
  • ubuntu-upgrade-linux-image-4-18-0-21-generic
  • ubuntu-upgrade-linux-image-4-18-0-21-generic-lpae
  • ubuntu-upgrade-linux-image-4-18-0-21-lowlatency
  • ubuntu-upgrade-linux-image-4-18-0-21-snapdragon
  • ubuntu-upgrade-linux-image-4-4-0-1045-aws
  • ubuntu-upgrade-linux-image-4-4-0-1047-kvm
  • ubuntu-upgrade-linux-image-4-4-0-1084-aws
  • ubuntu-upgrade-linux-image-4-4-0-1110-raspi2
  • ubuntu-upgrade-linux-image-4-4-0-1114-snapdragon
  • ubuntu-upgrade-linux-image-4-4-0-150-generic
  • ubuntu-upgrade-linux-image-4-4-0-150-generic-lpae
  • ubuntu-upgrade-linux-image-4-4-0-150-lowlatency
  • ubuntu-upgrade-linux-image-4-4-0-150-powerpc-e500mc
  • ubuntu-upgrade-linux-image-4-4-0-150-powerpc-smp
  • ubuntu-upgrade-linux-image-4-4-0-150-powerpc64-emb
  • ubuntu-upgrade-linux-image-4-4-0-150-powerpc64-smp
  • ubuntu-upgrade-linux-image-aws
  • ubuntu-upgrade-linux-image-aws-hwe
  • ubuntu-upgrade-linux-image-gcp
  • ubuntu-upgrade-linux-image-generic
  • ubuntu-upgrade-linux-image-generic-hwe-16-04
  • ubuntu-upgrade-linux-image-generic-hwe-18-04
  • ubuntu-upgrade-linux-image-generic-lpae
  • ubuntu-upgrade-linux-image-generic-lpae-hwe-16-04
  • ubuntu-upgrade-linux-image-generic-lpae-hwe-18-04
  • ubuntu-upgrade-linux-image-generic-lpae-lts-xenial
  • ubuntu-upgrade-linux-image-generic-lts-xenial
  • ubuntu-upgrade-linux-image-gke
  • ubuntu-upgrade-linux-image-kvm
  • ubuntu-upgrade-linux-image-lowlatency
  • ubuntu-upgrade-linux-image-lowlatency-hwe-16-04
  • ubuntu-upgrade-linux-image-lowlatency-hwe-18-04
  • ubuntu-upgrade-linux-image-lowlatency-lts-xenial
  • ubuntu-upgrade-linux-image-oem
  • ubuntu-upgrade-linux-image-oracle
  • ubuntu-upgrade-linux-image-powerpc-e500mc
  • ubuntu-upgrade-linux-image-powerpc-smp
  • ubuntu-upgrade-linux-image-powerpc64-emb
  • ubuntu-upgrade-linux-image-powerpc64-smp
  • ubuntu-upgrade-linux-image-raspi2
  • ubuntu-upgrade-linux-image-snapdragon
  • ubuntu-upgrade-linux-image-snapdragon-hwe-18-04
  • ubuntu-upgrade-linux-image-virtual
  • ubuntu-upgrade-linux-image-virtual-hwe-16-04
  • ubuntu-upgrade-python3-apparmor

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;