First published: Tue Jul 23 2019(Updated: )
It was discovered that an integer overflow existed in the Linux kernel when reference counting pages, leading to potential use-after-free issues. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-11487) Jann Horn discovered that a race condition existed in the Linux kernel when performing core dumps. A local attacker could use this to cause a denial of service (system crash) or expose sensitive information. (CVE-2019-11599) It was discovered that the ext4 file system implementation in the Linux kernel did not properly zero out memory in some situations. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2019-11833) It was discovered that the Bluetooth Human Interface Device Protocol (HIDP) implementation in the Linux kernel did not properly verify strings were NULL terminated in certain situations. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2019-11884)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-gke | <5.0.0.1011.11 | 5.0.0.1011.11 |
=19.04 | ||
All of | ||
ubuntu/linux-image-5.0.0-1017-snapdragon | <5.0.0-1017.18 | 5.0.0-1017.18 |
=19.04 | ||
All of | ||
ubuntu/linux-image-5.0.0-21-generic | <5.0.0-21.22 | 5.0.0-21.22 |
=19.04 | ||
All of | ||
ubuntu/linux-image-5.0.0-1013-raspi2 | <5.0.0-1013.13 | 5.0.0-1013.13 |
=19.04 | ||
All of | ||
ubuntu/linux-image-gcp | <5.0.0.1011.11 | 5.0.0.1011.11 |
=19.04 | ||
All of | ||
ubuntu/linux-image-5.0.0-1012-azure | <5.0.0-1012.12 | 5.0.0-1012.12 |
=19.04 | ||
All of | ||
ubuntu/linux-image-azure | <5.0.0.1012.11 | 5.0.0.1012.11 |
=19.04 | ||
All of | ||
ubuntu/linux-image-5.0.0-21-generic-lpae | <5.0.0-21.22 | 5.0.0-21.22 |
=19.04 | ||
All of | ||
ubuntu/linux-image-generic | <5.0.0.21.22 | 5.0.0.21.22 |
=19.04 | ||
All of | ||
ubuntu/linux-image-virtual | <5.0.0.21.22 | 5.0.0.21.22 |
=19.04 | ||
All of | ||
ubuntu/linux-image-5.0.0-21-lowlatency | <5.0.0-21.22 | 5.0.0-21.22 |
=19.04 | ||
All of | ||
ubuntu/linux-image-raspi2 | <5.0.0.1013.10 | 5.0.0.1013.10 |
=19.04 | ||
All of | ||
ubuntu/linux-image-aws | <5.0.0.1011.11 | 5.0.0.1011.11 |
=19.04 | ||
All of | ||
ubuntu/linux-image-generic-lpae | <5.0.0.21.22 | 5.0.0.21.22 |
=19.04 | ||
All of | ||
ubuntu/linux-image-snapdragon | <5.0.0.1017.10 | 5.0.0.1017.10 |
=19.04 | ||
All of | ||
ubuntu/linux-image-5.0.0-1011-kvm | <5.0.0-1011.12 | 5.0.0-1011.12 |
=19.04 | ||
All of | ||
ubuntu/linux-image-kvm | <5.0.0.1011.11 | 5.0.0.1011.11 |
=19.04 | ||
All of | ||
ubuntu/linux-image-5.0.0-1011-gcp | <5.0.0-1011.11 | 5.0.0-1011.11 |
=19.04 | ||
All of | ||
ubuntu/linux-image-lowlatency | <5.0.0.21.22 | 5.0.0.21.22 |
=19.04 | ||
All of | ||
ubuntu/linux-image-5.0.0-1011-aws | <5.0.0-1011.12 | 5.0.0-1011.12 |
=19.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The vulnerability ID for this Linux kernel vulnerability is CVE-2019-11487.
The vulnerability could lead to potential use-after-free issues, causing a denial of service (system crash) or possibly arbitrary code execution.
The Linux kernel versions affected by this vulnerability are 5.0.0.1011.11, 5.0.0-1017.18, 5.0.0-21.22, 5.0.0-1013.13, and 5.0.0.1012.11.
To fix this vulnerability, update your Linux kernel to version 5.0.0.1011.11, 5.0.0-1017.18, 5.0.0-21.22, 5.0.0-1013.13, or 5.0.0.1012.11.
You can find more information about this vulnerability at the following references: [CVE-2019-11487](https://ubuntu.com/security/CVE-2019-11487), [CVE-2019-11599](https://ubuntu.com/security/CVE-2019-11599), [CVE-2019-11833](https://ubuntu.com/security/CVE-2019-11833).