First published: Mon Apr 22 2019(Updated: )
A flaw was found in the Linux kernel's implementation of the FUSE filesystem, where it allows a page reference counter overflow. If a page reference counter overflows into a negative value, it can be placed back into the "free" list for reuse by other applications. This flaw allows a local attacker who can manipulate memory page reference counters to cause memory corruption and possible privilege escalation by triggering a use-after-free condition. The current attack requires the system to have approximately 140 GB of RAM for this attack to be performed. It may be possible that the attack can occur with fewer memory requirements.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <0:2.6.32-754.35.1.el6 | 0:2.6.32-754.35.1.el6 |
redhat/kernel-rt | <0:3.10.0-1062.18.1.rt56.1044.el7 | 0:3.10.0-1062.18.1.rt56.1044.el7 |
redhat/kernel-alt | <0:4.14.0-115.17.1.el7a | 0:4.14.0-115.17.1.el7a |
redhat/kernel | <0:3.10.0-1062.18.1.el7 | 0:3.10.0-1062.18.1.el7 |
redhat/kernel | <0:3.10.0-693.71.2.el7 | 0:3.10.0-693.71.2.el7 |
redhat/kernel | <0:3.10.0-957.56.1.el7 | 0:3.10.0-957.56.1.el7 |
redhat/kernel-rt | <0:4.18.0-80.11.1.rt9.156.el8_0 | 0:4.18.0-80.11.1.rt9.156.el8_0 |
redhat/kernel | <0:4.18.0-80.11.1.el8_0 | 0:4.18.0-80.11.1.el8_0 |
redhat/kernel-rt | <1:3.10.0-693.71.2.rt56.670.el6 | 1:3.10.0-693.71.2.rt56.670.el6 |
IBM Data Risk Manager | <=2.0.6 | |
Linux kernel | <4.4.216 | |
Linux kernel | >=4.5<4.9.181 | |
Linux kernel | >=4.10<4.14.116 | |
Linux kernel | >=4.15<4.19.39 | |
Linux kernel | >=4.20<5.0.12 | |
Linux kernel | =5.1-rc1 | |
Linux kernel | =5.1-rc2 | |
Linux kernel | =5.1-rc3 | |
Linux kernel | =5.1-rc4 | |
Debian | =8.0 | |
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =18.04 | |
Ubuntu Linux | =19.04 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.17-1 |
Preventing loading of the 'fuse' kernel module will prevent attackers from using this exploit against the system; howeve the functionality of being able to access the filesystems that would be allowed by fuse would no longer be allowed . See “How do I blacklist a kernel module to prevent it from loading automatically?" ( https://access.redhat.com/solutions/41278) for instructions on how to disable the 'fuse' kernel module from autoloading. This mitigation may not be suitable if access to the functionality provided by fuse is required.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2019-11487 is classified as a high severity vulnerability due to the potential for local attackers to exploit it.
To mitigate CVE-2019-11487, upgrade to the fixed kernel versions specified by your Linux distribution.
CVE-2019-11487 affects various Linux kernel versions including those used in Red Hat, Ubuntu, and Debian operating systems.
No, CVE-2019-11487 requires local access to the system to be exploited.
Yes, multiple patches are available in the updated kernel versions from affected distributions.