CVE-2019-5489

MEDIUM

Linux Kernel < 4.19.13 - Information Disclosure via mincore() Page Cache Access

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2019-5489. PoCs published by mmxsrup.

AI-analyzed exploit summary This repository contains a proof-of-concept for CVE-2019-5489, demonstrating a page cache side-channel attack to establish a covert channel between two processes on Linux kernels before 5.0. The PoC includes sender and receiver processes that transmit data via page cache state manipulation.

Description

The mincore() implementation in mm/mincore.c in the Linux kernel through 4.19.13 allowed local attackers to observe page cache access patterns of other processes on the same system, potentially allowing sniffing of secret information. (Fixing this affects the output of the fincore program.) Limited remote exploitation may be possible, as demonstrated by latency differences in accessing public files from an Apache HTTP Server.

Exploits (1)

nomisec WORKING POC 9 stars
by mmxsrup · poc
https://github.com/mmxsrup/CVE-2019-5489

This repository contains a proof-of-concept for CVE-2019-5489, demonstrating a page cache side-channel attack to establish a covert channel between two processes on Linux kernels before 5.0. The PoC includes sender and receiver processes that transmit data via page cache state manipulation.

Classification
Working Poc 95%
Attack Type
Info Leak
Complexity
Complex
Reliability
Reliable
Target: Linux Kernel < 5.0
No auth needed
Prerequisites: Linux Kernel < 5.0 · Swap space disabled · Access to execute binaries on the target system
devstral-2 · analyzed Feb 16, 2026 Full analysis →

References (32)

Core 32
Core References
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/106478
Third Party Advisory vendor-advisory x_refsource_debian
https://www.debian.org/security/2019/dsa-4465
Mailing List mailing-list x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2019/06/msg00010.html
Mailing List mailing-list x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2019/06/msg00011.html
Mailing List mailing-list x_refsource_bugtraq
https://seclists.org/bugtraq/2019/Jun/26
Vendor Advisory vendor-advisory x_refsource_redhat
https://access.redhat.com/errata/RHSA-2019:2043
Vendor Advisory vendor-advisory x_refsource_redhat
https://access.redhat.com/errata/RHSA-2019:2029
Vendor Advisory vendor-advisory x_refsource_redhat
https://access.redhat.com/errata/RHSA-2019:2473
Vendor Advisory vendor-advisory x_refsource_redhat
https://access.redhat.com/errata/RHSA-2019:2808
Vendor Advisory vendor-advisory x_refsource_redhat
https://access.redhat.com/errata/RHSA-2019:2837
Vendor Advisory vendor-advisory x_refsource_redhat
https://access.redhat.com/errata/RHSA-2019:2809
Vendor Advisory vendor-advisory x_refsource_redhat
https://access.redhat.com/errata/RHSA-2019:3309
Vendor Advisory vendor-advisory x_refsource_redhat
https://access.redhat.com/errata/RHSA-2019:3517
Vendor Advisory vendor-advisory x_refsource_redhat
https://access.redhat.com/errata/RHSA-2019:3967
Vendor Advisory vendor-advisory x_refsource_redhat
https://access.redhat.com/errata/RHSA-2019:4058
Vendor Advisory vendor-advisory x_refsource_redhat
https://access.redhat.com/errata/RHSA-2019:4057
Vendor Advisory vendor-advisory x_refsource_redhat
https://access.redhat.com/errata/RHSA-2019:4056
Vendor Advisory vendor-advisory x_refsource_redhat
https://access.redhat.com/errata/RHSA-2019:4159
Vendor Advisory vendor-advisory x_refsource_redhat
https://access.redhat.com/errata/RHSA-2019:4164
Vendor Advisory vendor-advisory x_refsource_redhat
https://access.redhat.com/errata/RHSA-2019:4255
Vendor Advisory vendor-advisory x_refsource_redhat
https://access.redhat.com/errata/RHSA-2020:0204
Technical Description, Third Party Advisory x_refsource_misc
https://www.theregister.co.uk/2019/01/05/boffins_beat_page_cache/
Issue Tracking, Patch, Third Party Advisory x_refsource_misc
https://bugzilla.suse.com/show_bug.cgi?id=1120843
Third Party Advisory x_refsource_misc
https://arxiv.org/abs/1901.01161
Third Party Advisory x_refsource_confirm
https://security.netapp.com/advisory/ntap-20190307-0001/

Scores

CVSS v3 5.5
EPSS 0.0044
EPSS Percentile 63.3%
Attack Vector LOCAL
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Details

CWE
CWE-319
Status published
Products (3)
linux/linux_kernel < 4.19.13
netapp/active_iq_performance_analytics_services
netapp/element_software_management_node
Published Jan 07, 2019
Tracked Since Feb 18, 2026