CVE-2019-19767
kernel: use-after-free in __ext4_expand_extra_isize and ext4_xattr_set_entry related to fs/ext4/inode.c and fs/ext4/super.c
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
The Linux kernel before 5.4.2 mishandles ext4_expand_extra_isize, as demonstrated by use-after-free errors in __ext4_expand_extra_isize and ext4_xattr_set_entry, related to fs/ext4/inode.c and fs/ext4/super.c, aka CID-4ea99936a163.
El kernel de Linux versión anterior a 5.4.2 maneja inapropiadamente la función ext4_expand_extra_isize, como es demostrado por un error de uso de la memoria previamente liberada en las funciones __ext4_expand_extra_isize y ext4_xattr_set_entry, relacionadas con los archivos fs/ext4/inode.c y fs/ext4/super.c, también se conoce como CID-4ea99936a163.
A use-after-free flaw was found in the Linux kernel’s ext4 file system functionality when the user mount ext4 partition, with the usage of an additional debug parameter is defining an extra inode size. If this parameter has a non zero value, this flaw allows a local user to crash the system when inode expansion happens.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2019-12-12 CVE Reserved
- 2019-12-12 CVE Published
- 2024-08-05 CVE Updated
- 2024-08-05 First Exploit
- 2024-12-17 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-416: Use After Free
CAPEC
References (15)
URL | Tag | Source |
---|---|---|
https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html | Mailing List | |
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html | Mailing List | |
https://security.netapp.com/advisory/ntap-20200103-0001 | X_refsource_confirm |
URL | Date | SRC |
---|---|---|
https://bugzilla.kernel.org/show_bug.cgi?id=205609 | 2024-08-05 |
URL | Date | SRC |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html | 2020-01-03 | |
https://bugzilla.kernel.org/show_bug.cgi?id=205707 | 2020-01-03 | |
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.2 | 2020-01-03 | |
https://usn.ubuntu.com/4258-1 | 2020-01-03 | |
https://usn.ubuntu.com/4284-1 | 2020-01-03 | |
https://usn.ubuntu.com/4287-1 | 2020-01-03 | |
https://usn.ubuntu.com/4287-2 | 2020-01-03 | |
https://access.redhat.com/security/cve/CVE-2019-19767 | 2020-11-04 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1786160 | 2020-11-04 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | < 5.4.2 Search vendor "Linux" for product "Linux Kernel" and version " < 5.4.2" | - |
Affected
|