Learn about CVE-2019-11190, a vulnerability in Linux kernel < 4.8 allowing local users to bypass ASLR on setuid programs. Find mitigation steps and update recommendations here.
In versions of the Linux kernel prior to 4.8, a vulnerability exists that allows local users to bypass ASLR on setuid programs like /bin/su. This loophole is due to a race condition in the load_elf_binary() function, where install_exec_creds() is called too late, leading to issues with the ptrace_may_access() check.
Understanding CVE-2019-11190
This CVE identifier pertains to a security flaw in the Linux kernel that impacts the Address Space Layout Randomization (ASLR) feature.
What is CVE-2019-11190?
The vulnerability in the Linux kernel before version 4.8 enables local users to bypass ASLR on setuid programs by exploiting a timing issue in the load_elf_binary() function.
The Impact of CVE-2019-11190
The security issue poses a risk to the integrity of ASLR protection on setuid programs, potentially allowing unauthorized access to sensitive information.
Technical Details of CVE-2019-11190
This section delves into the specifics of the vulnerability.
Vulnerability Description
The flaw arises from the delayed invocation of install_exec_creds() in the load_elf_binary() function, leading to a race condition during the ptrace_may_access() check.
Affected Systems and Versions
Exploitation Mechanism
Mitigation and Prevention
Protective measures and actions to address the CVE-2019-11190 vulnerability.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates