vulnerability

Ubuntu: (Multiple Advisories) (CVE-2019-11487): Linux kernel vulnerabilities

Severity
7
CVSS
(AV:L/AC:L/Au:N/C:C/I:C/A:C)
Published
Apr 23, 2019
Added
Jul 24, 2019
Modified
Aug 18, 2025

Description

The Linux kernel before 5.1-rc5 allows page->_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur with FUSE requests.

Solutions

ubuntu-upgrade-linux-image-4-15-0-1022-oracleubuntu-upgrade-linux-image-4-15-0-1041-gcpubuntu-upgrade-linux-image-4-15-0-1041-gkeubuntu-upgrade-linux-image-4-15-0-1043-kvmubuntu-upgrade-linux-image-4-15-0-1044-raspi2ubuntu-upgrade-linux-image-4-15-0-1047-awsubuntu-upgrade-linux-image-4-15-0-1056-azureubuntu-upgrade-linux-image-4-15-0-60-genericubuntu-upgrade-linux-image-4-15-0-60-generic-lpaeubuntu-upgrade-linux-image-4-15-0-60-lowlatencyubuntu-upgrade-linux-image-4-4-0-1059-kvmubuntu-upgrade-linux-image-4-4-0-1095-awsubuntu-upgrade-linux-image-4-4-0-1123-raspi2ubuntu-upgrade-linux-image-4-4-0-1127-snapdragonubuntu-upgrade-linux-image-4-4-0-165-genericubuntu-upgrade-linux-image-4-4-0-165-generic-lpaeubuntu-upgrade-linux-image-4-4-0-165-lowlatencyubuntu-upgrade-linux-image-4-4-0-165-powerpc-e500mcubuntu-upgrade-linux-image-4-4-0-165-powerpc-smpubuntu-upgrade-linux-image-4-4-0-165-powerpc64-embubuntu-upgrade-linux-image-4-4-0-165-powerpc64-smpubuntu-upgrade-linux-image-5-0-0-1011-awsubuntu-upgrade-linux-image-5-0-0-1011-gcpubuntu-upgrade-linux-image-5-0-0-1011-kvmubuntu-upgrade-linux-image-5-0-0-1012-azureubuntu-upgrade-linux-image-5-0-0-1013-raspi2ubuntu-upgrade-linux-image-5-0-0-1017-snapdragonubuntu-upgrade-linux-image-5-0-0-21-genericubuntu-upgrade-linux-image-5-0-0-21-generic-lpaeubuntu-upgrade-linux-image-5-0-0-21-lowlatencyubuntu-upgrade-linux-image-5-0-0-23-genericubuntu-upgrade-linux-image-5-0-0-23-generic-lpaeubuntu-upgrade-linux-image-5-0-0-23-lowlatencyubuntu-upgrade-linux-image-awsubuntu-upgrade-linux-image-aws-hweubuntu-upgrade-linux-image-azureubuntu-upgrade-linux-image-gcpubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-hwe-16-04ubuntu-upgrade-linux-image-generic-hwe-18-04ubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-generic-lpae-hwe-16-04ubuntu-upgrade-linux-image-generic-lpae-hwe-18-04ubuntu-upgrade-linux-image-gkeubuntu-upgrade-linux-image-gke-4-15ubuntu-upgrade-linux-image-kvmubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-lowlatency-hwe-16-04ubuntu-upgrade-linux-image-lowlatency-hwe-18-04ubuntu-upgrade-linux-image-oemubuntu-upgrade-linux-image-oracleubuntu-upgrade-linux-image-powerpc-e500mcubuntu-upgrade-linux-image-powerpc-smpubuntu-upgrade-linux-image-powerpc64-embubuntu-upgrade-linux-image-powerpc64-smpubuntu-upgrade-linux-image-raspi2ubuntu-upgrade-linux-image-snapdragonubuntu-upgrade-linux-image-snapdragon-hwe-18-04ubuntu-upgrade-linux-image-virtualubuntu-upgrade-linux-image-virtual-hwe-16-04ubuntu-upgrade-linux-image-virtual-hwe-18-04

References

    Title
    NEW

    Explore Exposure Command

    Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.