CVE-2019-14898 Detail

Current Description

The fix for CVE-2019-11599, affecting the Linux kernel before 5.0.10 was not complete. A local user could use this flaw to obtain sensitive information, cause a denial of service, or possibly have other unspecified impacts by triggering a race condition with mmget_not_zero or get_task_mm calls.

Source:  MITRE
View Analysis Description

Analysis Description

The fix for CVE-2019-11599, affecting the Linux kernel before 5.0.10 was not complete. A local user could use this flaw to obtain sensitive information, cause a denial of service, or possibly have other unspecified impacts by triggering a race condition with mmget_not_zero or get_task_mm calls.

Source:  MITRE

Severity

CVSS 3.x Severity and Metrics:

CVSS 2.0 Severity and Metrics:

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

Weakness Enumeration

CWE-ID CWE Name Source
CWE-667 Improper Locking NIST   Red Hat, Inc.  
CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization (‘Race Condition’) NIST   Red Hat, Inc.  

Known Affected Software Configurations Switch to CPE 2.2

Configuration 1 ( hide )
Configuration 2 ( hide )

Change History

1 change record found – show changes

Initial Analysis5/13/2020 9:58:15 PM

Action Type Old Value New Value
Added CPE Configuration
OR
     *cpe:2.3:a:redhat:enterprise_mrg:2.0:*:*:*:*:*:*:*
Added CPE Configuration
OR
     *cpe:2.3:o:linux:linux_kernel:5.0.10:*:*:*:*:*:*:*
Added CVSS V2
NIST (AV:L/AC:M/Au:N/C:C/I:C/A:C)
Added CVSS V3.1
NIST AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Added CWE
NIST CWE-362
Added CWE
NIST CWE-667
Changed Reference Type
https://bugs.chromium.org/p/project-zero/issues/detail?id=1790 No Types Assigned
https://bugs.chromium.org/p/project-zero/issues/detail?id=1790 Exploit, Mailing List, Patch, Third Party Advisory
Changed Reference Type
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14898 No Types Assigned
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14898 Issue Tracking, Third Party Advisory
Changed Reference Type
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.114 No Types Assigned
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.114 Mailing List, Vendor Advisory
Changed Reference Type
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.37 No Types Assigned
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.37 Mailing List, Vendor Advisory
Changed Reference Type
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.10 No Types Assigned
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.10 Mailing List, Vendor Advisory

Quick Info

CVE Dictionary Entry:
CVE-2019-14898
NVD Published Date:
05/08/2020
NVD Last Modified:
05/13/2020