Out-of-bounds read in Linux kernel - CVE-2019-19319
Published: November 28, 2019 / Updated: February 9, 2021
Linux kernel
Detailed vulnerability description
The vulnerability allows a local privileged user to execute arbitrary code.
The vulnerability exists due to an out-of-bounds read error within the __check_block_validity() function in fs/ext4/inode.c, within the debug_print_tree() and ext4_setup_system_zone() functions in fs/ext4/block_validity.c. A local privileged user can execute arbitrary code.
How to mitigate CVE-2019-19319
Sources
- http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html
- https://bugzilla.suse.com/show_bug.cgi?id=1158021
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=345c0dbf3a30
- https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19319
- https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
- https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html
- https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
- https://security.netapp.com/advisory/ntap-20200103-0001/
- https://usn.ubuntu.com/4391-1/
- https://www.debian.org/security/2020/dsa-4698