The block subsystem in the Linux kernel before 5.2 has a use-after-free that can lead to arbitrary code execution in the kernel context and privilege escalation, aka CID-c3e2219216c9. This is related to blk_mq_free_rqs and blk_cleanup_queue.
References
Link | Resource |
---|---|
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2 | Patch Vendor Advisory |
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c3e2219216c92919a6bd1711f340f5faa98695e6 | Mailing List Patch Vendor Advisory |
https://security.netapp.com/advisory/ntap-20210629-0006/ | Third Party Advisory |
https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-blk_mq_free_rqs | Third Party Advisory |
https://syzkaller.appspot.com/bug?id=36fe241584203cf394d44560a42e3430434f1213 | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2021-05-14T22:57:29
Updated: 2021-06-29T09:06:25
Reserved: 2021-05-14T00:00:00
Link: CVE-2019-25044
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-05-14T23:15:07.507
Modified: 2023-01-24T02:01:08.940
Link: CVE-2019-25044
JSON object: View
Redhat Information
No data.
CWE