Логотип exploitDog
bind:CVE-2019-11191
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-11191

Количество 7

Количество 7

ubuntu логотип

CVE-2019-11191

почти 7 лет назад

The Linux kernel through 5.0.7, when CONFIG_IA32_AOUT is enabled and ia32_aout is loaded, allows local users to bypass ASLR on setuid a.out programs (if any exist) because install_exec_creds() is called too late in load_aout_binary() in fs/binfmt_aout.c, and thus the ptrace_may_access() check has a race condition when reading /proc/pid/stat. NOTE: the software maintainer disputes that this is a vulnerability because ASLR for a.out format executables has never been supported

CVSS3: 2.5
EPSS: Низкий
redhat логотип

CVE-2019-11191

почти 7 лет назад

The Linux kernel through 5.0.7, when CONFIG_IA32_AOUT is enabled and ia32_aout is loaded, allows local users to bypass ASLR on setuid a.out programs (if any exist) because install_exec_creds() is called too late in load_aout_binary() in fs/binfmt_aout.c, and thus the ptrace_may_access() check has a race condition when reading /proc/pid/stat. NOTE: the software maintainer disputes that this is a vulnerability because ASLR for a.out format executables has never been supported

CVSS3: 2.5
EPSS: Низкий
nvd логотип

CVE-2019-11191

почти 7 лет назад

The Linux kernel through 5.0.7, when CONFIG_IA32_AOUT is enabled and ia32_aout is loaded, allows local users to bypass ASLR on setuid a.out programs (if any exist) because install_exec_creds() is called too late in load_aout_binary() in fs/binfmt_aout.c, and thus the ptrace_may_access() check has a race condition when reading /proc/pid/stat. NOTE: the software maintainer disputes that this is a vulnerability because ASLR for a.out format executables has never been supported

CVSS3: 2.5
EPSS: Низкий
debian логотип

CVE-2019-11191

почти 7 лет назад

The Linux kernel through 5.0.7, when CONFIG_IA32_AOUT is enabled and i ...

CVSS3: 2.5
EPSS: Низкий
github логотип

GHSA-wv63-pcg9-3x4q

больше 3 лет назад

** DISPUTED ** The Linux kernel through 5.0.7, when CONFIG_IA32_AOUT is enabled and ia32_aout is loaded, allows local users to bypass ASLR on setuid a.out programs (if any exist) because install_exec_creds() is called too late in load_aout_binary() in fs/binfmt_aout.c, and thus the ptrace_may_access() check has a race condition when reading /proc/pid/stat. NOTE: the software maintainer disputes that this is a vulnerability because ASLR for a.out format executables has never been supported.

CVSS3: 2.5
EPSS: Низкий
fstec логотип

BDU:2020-02567

почти 7 лет назад

Уязвимость функции load_aout_binary() ядра операционной системы Linux, позволяющая нарушителю обойти механизм защиты ASLR

CVSS3: 2.5
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2019:1570-1

больше 6 лет назад

Security update for the Linux Kernel

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2019-11191

The Linux kernel through 5.0.7, when CONFIG_IA32_AOUT is enabled and ia32_aout is loaded, allows local users to bypass ASLR on setuid a.out programs (if any exist) because install_exec_creds() is called too late in load_aout_binary() in fs/binfmt_aout.c, and thus the ptrace_may_access() check has a race condition when reading /proc/pid/stat. NOTE: the software maintainer disputes that this is a vulnerability because ASLR for a.out format executables has never been supported

CVSS3: 2.5
0%
Низкий
почти 7 лет назад
redhat логотип
CVE-2019-11191

The Linux kernel through 5.0.7, when CONFIG_IA32_AOUT is enabled and ia32_aout is loaded, allows local users to bypass ASLR on setuid a.out programs (if any exist) because install_exec_creds() is called too late in load_aout_binary() in fs/binfmt_aout.c, and thus the ptrace_may_access() check has a race condition when reading /proc/pid/stat. NOTE: the software maintainer disputes that this is a vulnerability because ASLR for a.out format executables has never been supported

CVSS3: 2.5
0%
Низкий
почти 7 лет назад
nvd логотип
CVE-2019-11191

The Linux kernel through 5.0.7, when CONFIG_IA32_AOUT is enabled and ia32_aout is loaded, allows local users to bypass ASLR on setuid a.out programs (if any exist) because install_exec_creds() is called too late in load_aout_binary() in fs/binfmt_aout.c, and thus the ptrace_may_access() check has a race condition when reading /proc/pid/stat. NOTE: the software maintainer disputes that this is a vulnerability because ASLR for a.out format executables has never been supported

CVSS3: 2.5
0%
Низкий
почти 7 лет назад
debian логотип
CVE-2019-11191

The Linux kernel through 5.0.7, when CONFIG_IA32_AOUT is enabled and i ...

CVSS3: 2.5
0%
Низкий
почти 7 лет назад
github логотип
GHSA-wv63-pcg9-3x4q

** DISPUTED ** The Linux kernel through 5.0.7, when CONFIG_IA32_AOUT is enabled and ia32_aout is loaded, allows local users to bypass ASLR on setuid a.out programs (if any exist) because install_exec_creds() is called too late in load_aout_binary() in fs/binfmt_aout.c, and thus the ptrace_may_access() check has a race condition when reading /proc/pid/stat. NOTE: the software maintainer disputes that this is a vulnerability because ASLR for a.out format executables has never been supported.

CVSS3: 2.5
0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2020-02567

Уязвимость функции load_aout_binary() ядра операционной системы Linux, позволяющая нарушителю обойти механизм защиты ASLR

CVSS3: 2.5
0%
Низкий
почти 7 лет назад
suse-cvrf логотип
openSUSE-SU-2019:1570-1

Security update for the Linux Kernel

больше 6 лет назад

Уязвимостей на страницу