Description
The Linux kernel through 5.0.7, when CONFIG_IA32_AOUT is enabled and ia32_aout is loaded, allows local users to bypass ASLR on setuid a.out programs (if any exist) because install_exec_creds() is called too late in load_aout_binary() in fs/binfmt_aout.c, and thus the ptrace_may_access() check has a race condition when reading /proc/pid/stat. NOTE: the software maintainer disputes that this is a vulnerability because ASLR for a.out format executables has never been supported
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Ubuntu USN |
USN-4006-1 | Linux kernel vulnerability |
Ubuntu USN |
USN-4006-2 | Linux kernel (HWE) vulnerability |
Ubuntu USN |
USN-4007-1 | Linux kernel vulnerability |
Ubuntu USN |
USN-4007-2 | Linux kernel (HWE) vulnerability |
Ubuntu USN |
USN-4008-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-4008-3 | Linux kernel (Xenial HWE) vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T22:48:08.995Z
Reserved: 2019-04-11T00:00:00.000Z
Link: CVE-2019-11191
No data.
Status : Modified
Published: 2019-04-12T00:29:00.310
Modified: 2024-11-21T04:20:42.093
Link: CVE-2019-11191
OpenCVE Enrichment
No data.
Weaknesses
Ubuntu USN