Use-after-free in Linux kernel - CVE-2019-19767

 

Use-after-free in Linux kernel - CVE-2019-19767

Published: December 12, 2019 / Updated: July 17, 2020


Vulnerability identifier: #VU30553
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2019-19767
CWE-ID: CWE-416
Exploitation vector: Local access
Exploit availability: No public exploit available
Vendor: Linux Foundation
Affected software:
Linux kernel

Detailed vulnerability description

The vulnerability allows a local non-authenticated attacker to perform a denial of service (DoS) attack.

The Linux kernel before 5.4.2 mishandles ext4_expand_extra_isize, as demonstrated by use-after-free errors in __ext4_expand_extra_isize and ext4_xattr_set_entry, related to fs/ext4/inode.c and fs/ext4/super.c, aka CID-4ea99936a163.


How to mitigate CVE-2019-19767

Install update from vendor's website.

Sources