4.4
CVSSv2

CVE-2019-19319

Published: 27/11/2019 Updated: 09/02/2021
CVSS v2 Base Score: 4.4 | Impact Score: 6.4 | Exploitability Score: 3.4
CVSS v3 Base Score: 6.5 | Impact Score: 5.9 | Exploitability Score: 0.6
VMScore: 392
Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

In the Linux kernel prior to 5.2, a setxattr operation, after a mount of a crafted ext4 image, can cause a slab-out-of-bounds write access because of an ext4_xattr_set_entry use-after-free in fs/ext4/xattr.c when a large old_size value is used in a memset call, aka CID-345c0dbf3a30.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel 5.0.21

opensuse leap 15.1

redhat enterprise linux 7.0

redhat enterprise linux 8.0

Vendor Advisories

Several security issues were fixed in the Linux kernel ...
Synopsis Moderate: kernel-rt security and bug fix update Type/Severity Security Advisory: Moderate Topic An update for kernel-rt is now available for Red Hat Enterprise Linux 8Red Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Scoring System (CVSS ...
Synopsis Moderate: kernel security, bug fix, and enhancement update Type/Severity Security Advisory: Moderate Topic An update for kernel is now available for Red Hat Enterprise Linux 8Red Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Scoring Syst ...
Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks CVE-2019-2182 Hanjun Guo and Lei Li reported a race condition in the arm64 virtual memory management code, which could lead to an information disclosure, denial of service (crash), or possibl ...
In the Linux kernel 5021, a setxattr operation, after a mount of a crafted ext4 image, can cause a slab-out-of-bounds write access because of an ext4_xattr_set_entry use-after-free in fs/ext4/xattrc when a large old_size value is used in a memset call(CVE-2019-19319) In the Linux kernel 540-rc2, there is a use-after-free (read) in the __blk_a ...
In the Linux kernel 5021, a setxattr operation, after a mount of a crafted ext4 image, can cause a slab-out-of-bounds write access because of an ext4_xattr_set_entry use-after-free in fs/ext4/xattrc when a large old_size value is used in a memset call (CVE-2019-19319) ...
In the Linux kernel 5021, a setxattr operation, after a mount of a crafted ext4 image, can cause a slab-out-of-bounds write access because of an ext4_xattr_set_entry use-after-free in fs/ext4/xattrc when a large old_size value is used in a memset call (CVE-2019-19319) ...
In the Linux kernel 5021, a setxattr operation, after a mount of a crafted ext4 image, can cause a slab-out-of-bounds write access because of an ext4_xattr_set_entry use-after-free in fs/ext4/xattrc when a large old_size value is used in a memset call (CVE-2019-19319) ...
In the Linux kernel 5021, a setxattr operation, after a mount of a crafted ext4 image, can cause a slab-out-of-bounds write access because of an ext4_xattr_set_entry use-after-free in fs/ext4/xattrc when a large old_size value is used in a memset call(CVE-2019-19319) In the Linux kernel 540-rc2, there is a use-after-free (read) in the __blk_a ...
In the Linux kernel 5021, a setxattr operation, after a mount of a crafted ext4 image, can cause a slab-out-of-bounds write access because of an ext4_xattr_set_entry use-after-free in fs/ext4/xattrc when a large old_size value is used in a memset call (CVE-2019-19319) ...