Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "https://github.com/torvalds/linux/commit/04f5866e41fb70690e28397487d8bd8eea7d712a", "name": "https://github.com/torvalds/linux/commit/04f5866e41fb70690e28397487d8bd8eea7d712a", "tags": ["Patch", "Third Party Advisory"], "refsource": "MISC"}, {"url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=04f5866e41fb70690e28397487d8bd8eea7d712a", "name": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=04f5866e41fb70690e28397487d8bd8eea7d712a", "tags": ["Mailing List", "Patch", "Vendor Advisory"], "refsource": "MISC"}, {"url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.10", "name": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.10", "tags": ["Mailing List", "Vendor Advisory"], "refsource": "MISC"}, {"url": "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.37", "name": "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.37", "tags": ["Mailing List", "Vendor Advisory"], "refsource": "MISC"}, {"url": "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.114", "name": "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.114", "tags": ["Mailing List", "Vendor Advisory"], "refsource": "MISC"}, {"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1790", "name": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1790", "tags": ["Mailing List", "Exploit", "Third Party Advisory"], "refsource": "MISC"}, {"url": "http://www.openwall.com/lists/oss-security/2019/04/29/2", "name": "[oss-security] 20190429 Re: Linux kernel: multiple issues", "tags": ["Mailing List", "Third Party Advisory"], "refsource": "MLIST"}, {"url": "http://www.openwall.com/lists/oss-security/2019/04/29/1", "name": "[oss-security] 20190429 Linux kernel: multiple issues", "tags": ["Mailing List", "Third Party Advisory"], "refsource": "MLIST"}, {"url": "http://packetstormsecurity.com/files/152663/Linux-Missing-Lockdown.html", "name": "http://packetstormsecurity.com/files/152663/Linux-Missing-Lockdown.html", "tags": ["Exploit", "Third Party Advisory", "VDB Entry"], "refsource": "MISC"}, {"url": "http://www.openwall.com/lists/oss-security/2019/04/30/1", "name": "[oss-security] 20190430 Re: Linux kernel: multiple issues", "tags": ["Mailing List", "Third Party Advisory"], "refsource": "MLIST"}, {"url": "https://www.exploit-db.com/exploits/46781/", "name": "46781", "tags": ["Exploit", "Third Party Advisory", "VDB Entry"], "refsource": "EXPLOIT-DB"}, {"url": "http://www.securityfocus.com/bid/108113", "name": "108113", "tags": ["Third Party Advisory", "VDB Entry"], "refsource": "BID"}, {"url": "https://security.netapp.com/advisory/ntap-20190517-0002/", "name": "https://security.netapp.com/advisory/ntap-20190517-0002/", "tags": [], "refsource": "CONFIRM"}, {"url": "https://lists.debian.org/debian-lts-announce/2019/05/msg00041.html", "name": "[debian-lts-announce] 20190528 [SECURITY] [DLA 1799-1] linux security update", "tags": [], "refsource": "MLIST"}, {"url": "https://lists.debian.org/debian-lts-announce/2019/05/msg00042.html", "name": "[debian-lts-announce] 20190528 [SECURITY] [DLA 1799-2] linux security update", "tags": [], "refsource": "MLIST"}, {"url": "https://www.debian.org/security/2019/dsa-4465", "name": "DSA-4465", "tags": [], "refsource": "DEBIAN"}, {"url": "https://lists.debian.org/debian-lts-announce/2019/06/msg00011.html", "name": "[debian-lts-announce] 20190618 [SECURITY] [DLA 1824-1] linux-4.9 security update", "tags": [], "refsource": "MLIST"}, {"url": "https://seclists.org/bugtraq/2019/Jun/26", "name": "20190618 [SECURITY] [DSA 4465-1] linux security update", "tags": [], "refsource": "BUGTRAQ"}, {"url": "https://support.f5.com/csp/article/K51674118", "name": "https://support.f5.com/csp/article/K51674118", "tags": [], "refsource": "CONFIRM"}, {"url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00014.html", "name": "openSUSE-SU-2019:1716", "tags": [], "refsource": "SUSE"}, {"url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00025.html", "name": "openSUSE-SU-2019:1757", "tags": [], "refsource": "SUSE"}, {"url": "https://seclists.org/bugtraq/2019/Jul/33", "name": "20190722 [slackware-security] Slackware 14.2 kernel (SSA:2019-202-01)", "tags": [], "refsource": "BUGTRAQ"}, {"url": "https://usn.ubuntu.com/4069-1/", "name": "USN-4069-1", "tags": [], "refsource": "UBUNTU"}, {"url": "http://packetstormsecurity.com/files/153702/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html", "name": "http://packetstormsecurity.com/files/153702/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html", "tags": [], "refsource": "MISC"}, {"url": "https://usn.ubuntu.com/4069-2/", "name": "USN-4069-2", "tags": [], "refsource": "UBUNTU"}, {"url": "https://access.redhat.com/errata/RHSA-2019:2043", "name": "RHSA-2019:2043", "tags": [], "refsource": "REDHAT"}, {"url": "https://access.redhat.com/errata/RHSA-2019:2029", "name": "RHSA-2019:2029", "tags": [], "refsource": "REDHAT"}, {"url": "https://usn.ubuntu.com/4095-1/", "name": "USN-4095-1", "tags": [], "refsource": "UBUNTU"}, {"url": "https://usn.ubuntu.com/4115-1/", "name": "USN-4115-1", "tags": [], "refsource": "UBUNTU"}, {"url": "https://usn.ubuntu.com/4118-1/", "name": "USN-4118-1", "tags": [], "refsource": "UBUNTU"}, {"url": "https://support.f5.com/csp/article/K51674118?utm_source=f5support&utm_medium=RSS", "name": "https://support.f5.com/csp/article/K51674118?utm_source=f5support&utm_medium=RSS", "tags": [], "refsource": "CONFIRM"}, {"url": "https://access.redhat.com/errata/RHSA-2019:3309", "name": "RHSA-2019:3309", "tags": [], "refsource": "REDHAT"}, {"url": "https://access.redhat.com/errata/RHSA-2019:3517", "name": "RHSA-2019:3517", "tags": [], "refsource": "REDHAT"}, {"url": "https://access.redhat.com/errata/RHSA-2020:0100", "name": "RHSA-2020:0100", "tags": [], "refsource": "REDHAT"}, {"url": "https://access.redhat.com/errata/RHSA-2020:0103", "name": "RHSA-2020:0103", "tags": [], "refsource": "REDHAT"}, {"url": "https://access.redhat.com/errata/RHSA-2020:0179", "name": "RHSA-2020:0179", "tags": [], "refsource": "REDHAT"}, {"url": "https://access.redhat.com/errata/RHSA-2020:0543", "name": "RHSA-2020:0543", "tags": [], "refsource": "REDHAT"}, {"url": "https://security.netapp.com/advisory/ntap-20200608-0001/", "name": "https://security.netapp.com/advisory/ntap-20200608-0001/", "tags": [], "refsource": "CONFIRM"}, {"url": "https://www.oracle.com/security-alerts/cpuApr2021.html", "name": "https://www.oracle.com/security-alerts/cpuApr2021.html", "tags": [], "refsource": "MISC"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "The coredump implementation in the Linux kernel before 5.0.10 does not use locking or other mechanisms to prevent vma layout or vma flags changes while it runs, which allows local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition with mmget_not_zero or get_task_mm calls. This is related to fs/userfaultfd.c, mm/mmap.c, fs/proc/task_mmu.c, and drivers/infiniband/core/uverbs_main.c."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "CWE-667"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2019-11599", "ASSIGNER": "cve@mitre.org"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 6.9, "accessVector": "LOCAL", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "MEDIUM", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "severity": "MEDIUM", "acInsufInfo": false, "impactScore": 10.0, "obtainAllPrivilege": false, "exploitabilityScore": 3.4, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}, "baseMetricV3": {"cvssV3": {"scope": "UNCHANGED", "version": "3.0", "baseScore": 7.0, "attackVector": "LOCAL", "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "HIGH", "availabilityImpact": "HIGH", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 1.0}}, "publishedDate": "2019-04-29T18:29Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "5.0.10"}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2021-06-14T18:15Z"}