vulnerability
Ubuntu: (Multiple Advisories) (CVE-2019-11599): Linux kernel vulnerabilities
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:L/AC:M/Au:N/C:C/I:C/A:C) | Apr 29, 2019 | Jul 24, 2019 | Mar 27, 2026 |
Severity
7
CVSS
(AV:L/AC:M/Au:N/C:C/I:C/A:C)
Published
Apr 29, 2019
Added
Jul 24, 2019
Modified
Mar 27, 2026
Description
The coredump implementation in the Linux kernel before 5.0.10 does not use locking or other mechanisms to prevent vma layout or vma flags changes while it runs, which allows local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition with mmget_not_zero or get_task_mm calls. This is related to fs/userfaultfd.c, mm/mmap.c, fs/proc/task_mmu.c, and drivers/infiniband/core/uverbs_main.c.
Solutions
ubuntu-upgrade-linux-image-4-15-0-1022-oracleubuntu-upgrade-linux-image-4-15-0-1041-gcpubuntu-upgrade-linux-image-4-15-0-1041-gkeubuntu-upgrade-linux-image-4-15-0-1043-kvmubuntu-upgrade-linux-image-4-15-0-1044-raspi2ubuntu-upgrade-linux-image-4-15-0-1047-awsubuntu-upgrade-linux-image-4-15-0-1056-azureubuntu-upgrade-linux-image-4-15-0-60-genericubuntu-upgrade-linux-image-4-15-0-60-generic-lpaeubuntu-upgrade-linux-image-4-15-0-60-lowlatencyubuntu-upgrade-linux-image-4-4-0-1054-kvmubuntu-upgrade-linux-image-4-4-0-1090-awsubuntu-upgrade-linux-image-4-4-0-1118-raspi2ubuntu-upgrade-linux-image-4-4-0-1122-snapdragonubuntu-upgrade-linux-image-4-4-0-159-genericubuntu-upgrade-linux-image-4-4-0-159-generic-lpaeubuntu-upgrade-linux-image-4-4-0-159-lowlatencyubuntu-upgrade-linux-image-4-4-0-159-powerpc-e500mcubuntu-upgrade-linux-image-4-4-0-159-powerpc-smpubuntu-upgrade-linux-image-4-4-0-159-powerpc64-embubuntu-upgrade-linux-image-4-4-0-159-powerpc64-smpubuntu-upgrade-linux-image-5-0-0-1011-awsubuntu-upgrade-linux-image-5-0-0-1011-gcpubuntu-upgrade-linux-image-5-0-0-1011-kvmubuntu-upgrade-linux-image-5-0-0-1012-azureubuntu-upgrade-linux-image-5-0-0-1013-raspi2ubuntu-upgrade-linux-image-5-0-0-1017-snapdragonubuntu-upgrade-linux-image-5-0-0-21-genericubuntu-upgrade-linux-image-5-0-0-21-generic-lpaeubuntu-upgrade-linux-image-5-0-0-21-lowlatencyubuntu-upgrade-linux-image-5-0-0-23-genericubuntu-upgrade-linux-image-5-0-0-23-generic-lpaeubuntu-upgrade-linux-image-5-0-0-23-lowlatencyubuntu-upgrade-linux-image-awsubuntu-upgrade-linux-image-aws-hweubuntu-upgrade-linux-image-azureubuntu-upgrade-linux-image-gcpubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-hwe-16-04ubuntu-upgrade-linux-image-generic-hwe-18-04ubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-generic-lpae-hwe-16-04ubuntu-upgrade-linux-image-generic-lpae-hwe-18-04ubuntu-upgrade-linux-image-gkeubuntu-upgrade-linux-image-gke-4-15ubuntu-upgrade-linux-image-kvmubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-lowlatency-hwe-16-04ubuntu-upgrade-linux-image-lowlatency-hwe-18-04ubuntu-upgrade-linux-image-oemubuntu-upgrade-linux-image-oracleubuntu-upgrade-linux-image-powerpc-e500mcubuntu-upgrade-linux-image-powerpc-smpubuntu-upgrade-linux-image-powerpc64-embubuntu-upgrade-linux-image-powerpc64-smpubuntu-upgrade-linux-image-raspi2ubuntu-upgrade-linux-image-snapdragonubuntu-upgrade-linux-image-snapdragon-hwe-18-04ubuntu-upgrade-linux-image-virtualubuntu-upgrade-linux-image-virtual-hwe-16-04ubuntu-upgrade-linux-image-virtual-hwe-18-04
References
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.