First published: Fri Apr 19 2019(Updated: )
A flaw was found in the Linux kernel where the coredump implementation does not use locking or other mechanisms to prevent vma layout or vma flags changes while it runs. This allows local users to obtain sensitive information, cause a denial of service (DoS), or possibly have unspecified other impact by triggering a race condition with mmget_not_zero or get_task_mm calls.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:3.10.0-1062.rt56.1022.el7 | 0:3.10.0-1062.rt56.1022.el7 |
redhat/kernel | <0:3.10.0-1062.el7 | 0:3.10.0-1062.el7 |
redhat/kernel | <0:3.10.0-693.62.1.el7 | 0:3.10.0-693.62.1.el7 |
redhat/kernel | <0:3.10.0-862.48.1.el7 | 0:3.10.0-862.48.1.el7 |
redhat/kernel | <0:3.10.0-957.43.1.el7 | 0:3.10.0-957.43.1.el7 |
redhat/kernel-rt | <0:4.18.0-147.rt24.93.el8 | 0:4.18.0-147.rt24.93.el8 |
redhat/kernel | <0:4.18.0-147.el8 | 0:4.18.0-147.el8 |
redhat/kernel-rt | <1:3.10.0-693.62.1.rt56.659.el6 | 1:3.10.0-693.62.1.rt56.659.el6 |
Linux Linux kernel | <5.0.10 | |
redhat/kernel | <5.0.10 | 5.0.10 |
Linux Linux kernel | >=2.16.12<3.16.66 | |
Linux Linux kernel | >=3.17<4.4.183 | |
Linux Linux kernel | >=4.5<4.9.188 | |
Linux Linux kernel | >=4.10<4.14.114 | |
Linux Linux kernel | >=4.15<4.19.37 | |
Linux Linux kernel | >=4.20<5.0.10 | |
Google Android | ||
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.11.10-1 6.12.5-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)