First published: Sun Dec 08 2019(Updated: )
In the Linux kernel 5.0.21, mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c, related to dump_orphan_list in fs/ext4/super.c.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:3.10.0-1160.rt56.1131.el7 | 0:3.10.0-1160.rt56.1131.el7 |
redhat/kernel-alt | <0:4.14.0-115.21.2.el7a | 0:4.14.0-115.21.2.el7a |
redhat/kernel | <0:3.10.0-1160.el7 | 0:3.10.0-1160.el7 |
redhat/kernel | <0:3.10.0-693.81.1.el7 | 0:3.10.0-693.81.1.el7 |
redhat/kernel | <0:3.10.0-957.65.1.el7 | 0:3.10.0-957.65.1.el7 |
redhat/kernel | <0:3.10.0-1062.40.1.el7 | 0:3.10.0-1062.40.1.el7 |
redhat/kernel-rt | <0:4.18.0-240.rt7.54.el8 | 0:4.18.0-240.rt7.54.el8 |
redhat/kernel | <0:4.18.0-240.el8 | 0:4.18.0-240.el8 |
Linux Linux kernel | >=2.6.12<3.16.82 | |
Linux Linux kernel | >=3.17<4.4.208 | |
Linux Linux kernel | >=4.5.0<4.9.208 | |
Linux Linux kernel | >=4.10<4.14.159 | |
Linux Linux kernel | >=4.15<4.19.90 | |
Linux Linux kernel | >=4.20<5.3.17 | |
Linux Linux kernel | >=5.4<5.4.4 | |
Netapp Active Iq Unified Manager Vmware Vsphere | ||
Netapp Cloud Backup | ||
Netapp Data Availability Services | ||
Netapp Hci Baseboard Management Controller | =h610s | |
Netapp Steelstore Cloud Integrated Storage | ||
Netapp Solidfire Baseboard Management Controller |
Ext4 filesytems are built into the kernel so it is not possible to prevent the kernel module from loading. However, this flaw can be prevented by disallowing mounting of untrusted filesystems. As mounting is a privileged operation, (except for device hotplug) removing the ability for mounting and unmounting will prevent this flaw from being exploited.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2019-19447 is a vulnerability in the Linux kernel's ext4_unlink function that allows an attacker to corrupt memory or escalate privileges when deleting a file from a specially crafted ext4 filesystem.
CVE-2019-19447 has a severity rating of 7.8, which is considered high.
CVE-2019-19447 affects Linux kernel versions 5.0.21 and earlier.
To fix CVE-2019-19447, you should update your affected Linux kernel to version 5.0.22 or later.
Yes, you can find more information about CVE-2019-19447 on the following links: [link1](https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19447), [link2](https://bugzilla.kernel.org/show_bug.cgi?id=205433), [link3](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1781680).