CVE-2019-11487

CVSS V2 High 7.2 CVSS V3 High 7.8
Description
The Linux kernel before 5.1-rc5 allows page->_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur with FUSE requests.
Overview
  • CVE ID
  • CVE-2019-11487
  • Assigner
  • cve@mitre.org
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2019-04-23T22:29:05
  • Last Modified Date
  • 2023-02-24T18:43:05
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 1 OR 5.1
cpe:2.3:o:linux:linux_kernel:5.1:rc1:*:*:*:*:*:* 1 OR
cpe:2.3:o:linux:linux_kernel:5.1:rc2:*:*:*:*:*:* 1 OR
cpe:2.3:o:linux:linux_kernel:5.1:rc3:*:*:*:*:*:* 1 OR
cpe:2.3:o:linux:linux_kernel:5.1:rc4:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:L/AC:L/Au:N/C:C/I:C/A:C
  • Access Vector
  • LOCAL
  • Access Compatibility
  • LOW
  • Authentication
  • NONE
  • Confidentiality Impact
  • COMPLETE
  • Integrity Impact
  • COMPLETE
  • Availability Impact
  • COMPLETE
  • Base Score
  • 7.2
  • Severity
  • HIGH
  • Exploitability Score
  • 3.9
  • Impact Score
  • 10
CVSS Version 3
  • Version
  • 3.0
  • Vector String
  • CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Attack Vector
  • LOCAL
  • Attack Compatibility
  • LOW
  • Privileges Required
  • LOW
  • User Interaction
  • NONE
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • HIGH
  • Availability Impact
  • HIGH
  • Base Score
  • 7.8
  • Base Severity
  • HIGH
  • Exploitability Score
  • 1.8
  • Impact Score
  • 5.9
References
Reference URL Reference Tags
https://lwn.net/Articles/786044/ Exploit Third Party Advisory
https://github.com/torvalds/linux/commit/f958d7b528b1b40c44cfda5eabe2d82760d868c3 Patch Third Party Advisory
https://github.com/torvalds/linux/commit/8fde12ca79aff9b5ba951fce1a2641901b8d8e64 Patch Third Party Advisory
https://github.com/torvalds/linux/commit/88b1a17dfc3ed7728316478fae0f5ad508f50397 Patch Third Party Advisory
https://github.com/torvalds/linux/commit/6b3a707736301c2128ca85ce85fb13f60b5e350a Patch Third Party Advisory
https://github.com/torvalds/linux/commit/15fab63e1e57be9fdb5eec1bbc5916e9825e9acb Patch Third Party Advisory
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f958d7b528b1b40c44cfda5eabe2d82760d868c3 Patch Vendor Advisory
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8fde12ca79aff9b5ba951fce1a2641901b8d8e64 Patch Vendor Advisory
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=88b1a17dfc3ed7728316478fae0f5ad508f50397 Patch Vendor Advisory
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6b3a707736301c2128ca85ce85fb13f60b5e350a Patch Vendor Advisory
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=15fab63e1e57be9fdb5eec1bbc5916e9825e9acb Patch Vendor Advisory
https://bugs.chromium.org/p/project-zero/issues/detail?id=1752 Mitigation Exploit Third Party Advisory
http://www.securityfocus.com/bid/108054 Third Party Advisory
http://www.openwall.com/lists/oss-security/2019/04/29/1 Third Party Advisory
https://security.netapp.com/advisory/ntap-20190517-0005/
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html
https://support.f5.com/csp/article/K14255532
https://usn.ubuntu.com/4069-1/
https://usn.ubuntu.com/4069-2/
https://usn.ubuntu.com/4115-1/
https://usn.ubuntu.com/4118-1/
https://access.redhat.com/errata/RHSA-2019:2703
https://access.redhat.com/errata/RHSA-2019:2741
https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html
https://usn.ubuntu.com/4145-1/
https://access.redhat.com/errata/RHSA-2020:0174
https://www.oracle.com/security-alerts/cpuApr2021.html
History
Created Old Value New Value Data Type Notes
2022-05-10 07:11:43 Added to TrackCVE
2022-12-03 20:01:49 2019-04-23T22:29Z 2019-04-23T22:29:05 CVE Published Date updated
2022-12-03 20:01:49 2021-06-14T18:15:15 CVE Modified Date updated
2022-12-03 20:01:49 Modified Vulnerability Status updated
2023-02-23 15:08:38 Modified Undergoing Analysis Vulnerability Status updated
2023-02-24 19:08:54 2023-02-24T18:43:05 CVE Modified Date updated
2023-02-24 19:08:54 Undergoing Analysis Analyzed Vulnerability Status updated