Lucene search

K
ubuntucveUbuntu.comUB:CVE-2019-11191
HistoryApr 11, 2019 - 12:00 a.m.

CVE-2019-11191

2019-04-1100:00:00
ubuntu.com
ubuntu.com
10

2.5 Low

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N

1.9 Low

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:M/Au:N/C:P/I:N/A:N

0.0004 Low

EPSS

Percentile

5.3%

DISPUTED The Linux kernel through 5.0.7, when CONFIG_IA32_AOUT is
enabled and ia32_aout is loaded, allows local users to bypass ASLR on
setuid a.out programs (if any exist) because install_exec_creds() is called
too late in load_aout_binary() in fs/binfmt_aout.c, and thus the
ptrace_may_access() check has a race condition when reading /proc/pid/stat.
NOTE: the software maintainer disputes that this is a vulnerability because
ASLR for a.out format executables has never been supported.

Bugs

Notes

Author Note
tyhicks This only affects i386 Ubuntu kernels. Additionally, it is very unlikely that systems will have a setuid a.out program installed.
sbeattie configuration changes to disable i386 a.out support are in progress.
OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchlinux< 4.15.0-51.55UNKNOWN
ubuntu18.10noarchlinux< 4.18.0-21.22UNKNOWN
ubuntu16.04noarchlinux< 4.4.0-150.176UNKNOWN
ubuntu18.04noarchlinux-aws< 4.15.0-1040.42UNKNOWN
ubuntu18.10noarchlinux-aws< 4.18.0-1017.19UNKNOWN
ubuntu14.04noarchlinux-aws< 4.4.0-1045.48) Available with Ubuntu Pro or Ubuntu Pro (Infra-onlyUNKNOWN
ubuntu16.04noarchlinux-aws< 4.4.0-1084.94UNKNOWN
ubuntu16.04noarchlinux-aws-hwe< 4.15.0-1040.42~16.04.1UNKNOWN
ubuntu18.04noarchlinux-azure< 4.18.0-1019.19~18.04.1UNKNOWN
ubuntu18.10noarchlinux-azure< 4.18.0-1019.19UNKNOWN
Rows per page:
1-10 of 371

2.5 Low

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N

1.9 Low

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:M/Au:N/C:P/I:N/A:N

0.0004 Low

EPSS

Percentile

5.3%