cve/2019/CVE-2019-11599.md

26 lines
1.4 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2019-11599](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11599)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
The coredump implementation in the Linux kernel before 5.0.10 does not use locking or other mechanisms to prevent vma layout or vma flags changes while it runs, which allows local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition with mmget_not_zero or get_task_mm calls. This is related to fs/userfaultfd.c, mm/mmap.c, fs/proc/task_mmu.c, and drivers/infiniband/core/uverbs_main.c.
### POC
#### Reference
- http://packetstormsecurity.com/files/152663/Linux-Missing-Lockdown.html
- http://packetstormsecurity.com/files/153702/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
2024-06-18 02:51:15 +02:00
- https://github.com/torvalds/linux/commit/04f5866e41fb70690e28397487d8bd8eea7d712a
2024-05-26 14:27:05 +02:00
- https://seclists.org/bugtraq/2019/Jun/26
- https://usn.ubuntu.com/4115-1/
- https://usn.ubuntu.com/4118-1/
- https://www.exploit-db.com/exploits/46781/
- https://www.oracle.com/security-alerts/cpuApr2021.html
#### Github
- https://github.com/HaleyWei/POC-available
- https://github.com/Sec20-Paper310/Paper310