Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-11190

Опубликовано: 03 апр. 2019
Источник: redhat
CVSS3: 3.3

Описание

The Linux kernel before 4.8 allows local users to bypass ASLR on setuid programs (such as /bin/su) because install_exec_creds() is called too late in load_elf_binary() in fs/binfmt_elf.c, and thus the ptrace_may_access() check has a race condition when reading /proc/pid/stat.

A flaw in the load_elf_binary() function in the Linux kernel allows a local attacker to leak the base address of .text and stack sections for setuid binaries and bypass ASLR because install_exec_creds() is called too late in this function.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5kernelNot affected
Red Hat Enterprise Linux 6kernelNot affected
Red Hat Enterprise Linux 7kernel-altNot affected
Red Hat Enterprise Linux 8kernelNot affected
Red Hat Enterprise Linux 8kernel-rtNot affected
Red Hat Enterprise MRG 2kernel-rtWill not fix
Red Hat Enterprise Linux 7kernel-rtFixedRHSA-2020:107031.03.2020
Red Hat Enterprise Linux 7kernelFixedRHSA-2020:101631.03.2020

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-250
https://bugzilla.redhat.com/show_bug.cgi?id=1699856kernel: ASLR bypass for setuid binaries due to late install_exec_creds()

3.3 Low

CVSS3

Связанные уязвимости

CVSS3: 4.7
ubuntu
около 6 лет назад

The Linux kernel before 4.8 allows local users to bypass ASLR on setuid programs (such as /bin/su) because install_exec_creds() is called too late in load_elf_binary() in fs/binfmt_elf.c, and thus the ptrace_may_access() check has a race condition when reading /proc/pid/stat.

CVSS3: 4.7
nvd
около 6 лет назад

The Linux kernel before 4.8 allows local users to bypass ASLR on setuid programs (such as /bin/su) because install_exec_creds() is called too late in load_elf_binary() in fs/binfmt_elf.c, and thus the ptrace_may_access() check has a race condition when reading /proc/pid/stat.

CVSS3: 4.7
debian
около 6 лет назад

The Linux kernel before 4.8 allows local users to bypass ASLR on setui ...

CVSS3: 4.7
github
около 3 лет назад

The Linux kernel before 4.8 allows local users to bypass ASLR on setuid programs (such as /bin/su) because install_exec_creds() is called too late in load_elf_binary() in fs/binfmt_elf.c, and thus the ptrace_may_access() check has a race condition when reading /proc/pid/stat.

CVSS3: 4.7
fstec
почти 9 лет назад

Уязвимость функции load_elf_binary() ядра операционной системы Linux, позволяющая нарушителю обойти механизм защиты ASLR и раскрыть защищаемую информацию

3.3 Low

CVSS3