The block subsystem in the Linux kernel before 5.2 has a use-after-free that can lead to arbitrary code execution in the kernel context and privilege escalation, aka CID-c3e2219216c9. This is related to blk_mq_free_rqs and blk_cleanup_queue.

Project Subscriptions

Vendors Products
Linux Kernel Subscribe
Cloud Backup Subscribe
H300e Firmware Subscribe
H300s Firmware Subscribe
H410c Firmware Subscribe
H410s Firmware Subscribe
H500e Firmware Subscribe
H500s Firmware Subscribe
H700e Firmware Subscribe
H700s Firmware Subscribe
Solidfire \& Hci Management Node Subscribe
Solidfire Baseboard Management Controller Subscribe
Solidfire Baseboard Management Controller Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2019-11494 The block subsystem in the Linux kernel before 5.2 has a use-after-free that can lead to arbitrary code execution in the kernel context and privilege escalation, aka CID-c3e2219216c9. This is related to blk_mq_free_rqs and blk_cleanup_queue.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T03:00:18.847Z

Reserved: 2021-05-14T00:00:00

Link: CVE-2019-25044

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-05-14T23:15:07.507

Modified: 2024-11-21T04:39:48.930

Link: CVE-2019-25044

cve-icon Redhat

Severity : Important

Publid Date: 2019-06-06T00:00:00Z

Links: CVE-2019-25044 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses