The Linux kernel before 4.8 allows local users to bypass ASLR on setuid programs (such as /bin/su) because install_exec_creds() is called too late in load_elf_binary() in fs/binfmt_elf.c, and thus the ptrace_may_access() check has a race condition when reading /proc/pid/stat.
References
Configurations
History
21 Nov 2024, 04:20
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html - | |
References | () http://www.openwall.com/lists/oss-security/2019/04/15/1 - | |
References | () http://www.securityfocus.com/bid/107890 - | |
References | () https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/commit/?id=a5b5352558f6808db0589644ea5401b3e3148a0d - Patch, Third Party Advisory | |
References | () https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/commit/?id=e1676b55d874a43646e8b2c46d87f2f3e45516ff - Patch, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2019/05/msg00041.html - | |
References | () https://lists.debian.org/debian-lts-announce/2019/05/msg00042.html - | |
References | () https://usn.ubuntu.com/4008-1/ - | |
References | () https://usn.ubuntu.com/4008-2/ - | |
References | () https://usn.ubuntu.com/4008-3/ - | |
References | () https://www.openwall.com/lists/oss-security/2019/04/03/4 - Exploit, Mailing List, Third Party Advisory | |
References | () https://www.openwall.com/lists/oss-security/2019/04/03/4/1 - Exploit, Mailing List, Third Party Advisory |
Information
Published : 2019-04-12 00:29
Updated : 2024-11-21 04:20
NVD link : CVE-2019-11190
Mitre link : CVE-2019-11190
CVE.ORG link : CVE-2019-11190
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')