Unrated severityNVD Advisory· Published Aug 25, 2019· Updated Aug 5, 2024
CVE-2019-15538
CVE-2019-15538
Description
An issue was discovered in xfs_setattr_nonsize in fs/xfs/xfs_iops.c in the Linux kernel through 5.2.9. XFS partially wedges when a chgrp fails on account of being out of disk quota. xfs_setattr_nonsize is failing to unlock the ILOCK after the xfs_qm_vop_chown_reserve call fails. This is primarily a local DoS attack vector, but it might result as well in remote DoS if the XFS filesystem is exported for instance via NFS.
Affected products
78- Linux/Linux kerneldescription
- osv-coords77 versionspkg:rpm/opensuse/kernel-debug&distro=openSUSE%20Leap%2015.0pkg:rpm/opensuse/kernel-debug&distro=openSUSE%20Leap%2015.1pkg:rpm/opensuse/kernel-default&distro=openSUSE%20Leap%2015.0pkg:rpm/opensuse/kernel-default&distro=openSUSE%20Leap%2015.1pkg:rpm/opensuse/kernel-docs&distro=openSUSE%20Leap%2015.0pkg:rpm/opensuse/kernel-docs&distro=openSUSE%20Leap%2015.1pkg:rpm/opensuse/kernel-kvmsmall&distro=openSUSE%20Leap%2015.0pkg:rpm/opensuse/kernel-kvmsmall&distro=openSUSE%20Leap%2015.1pkg:rpm/opensuse/kernel-obs-build&distro=openSUSE%20Leap%2015.0pkg:rpm/opensuse/kernel-obs-build&distro=openSUSE%20Leap%2015.1pkg:rpm/opensuse/kernel-obs-qa&distro=openSUSE%20Leap%2015.0pkg:rpm/opensuse/kernel-obs-qa&distro=openSUSE%20Leap%2015.1pkg:rpm/opensuse/kernel-source&distro=openSUSE%20Leap%2015.0pkg:rpm/opensuse/kernel-source&distro=openSUSE%20Leap%2015.1pkg:rpm/opensuse/kernel-syms&distro=openSUSE%20Leap%2015.0pkg:rpm/opensuse/kernel-syms&distro=openSUSE%20Leap%2015.1pkg:rpm/opensuse/kernel-vanilla&distro=openSUSE%20Leap%2015.0pkg:rpm/opensuse/kernel-vanilla&distro=openSUSE%20Leap%2015.1pkg:rpm/suse/kernel-azure&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2015pkg:rpm/suse/kernel-azure&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2015%20SP1pkg:rpm/suse/kernel-azure&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP4pkg:rpm/suse/kernel-azure&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP4pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP4pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2012%20SP4pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2015pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2015%20SP1pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP1pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP1pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Legacy%2015pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Legacy%2015%20SP1pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP4pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP4pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2012%20SP4pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2015pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2015%20SP1pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP1pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP4pkg:rpm/suse/kernel-livepatch-SLE15-SP1_Update_5&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP1pkg:rpm/suse/kernel-livepatch-SLE15_Update_14&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015pkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015pkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP1pkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP4pkg:rpm/suse/kernel-rt_debug&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP4pkg:rpm/suse/kernel-rt_debug&distro=SUSE%20Real%20Time%20Module%2015%20SP1pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP4pkg:rpm/suse/kernel-rt&distro=SUSE%20Real%20Time%20Module%2015%20SP1pkg:rpm/suse/kernel-source-azure&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2015pkg:rpm/suse/kernel-source-azure&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2015%20SP1pkg:rpm/suse/kernel-source-azure&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP4pkg:rpm/suse/kernel-source-azure&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP4pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP4pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP1pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP1pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP4pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP4pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP4pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Real%20Time%20Module%2015%20SP1pkg:rpm/suse/kernel-syms-azure&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2015pkg:rpm/suse/kernel-syms-azure&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2015%20SP1pkg:rpm/suse/kernel-syms-azure&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP4pkg:rpm/suse/kernel-syms-azure&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP4pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP4pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP1pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP4pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP4pkg:rpm/suse/kernel-syms-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP4pkg:rpm/suse/kernel-syms-rt&distro=SUSE%20Real%20Time%20Module%2015%20SP1pkg:rpm/suse/kernel-vanilla&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015pkg:rpm/suse/kernel-zfcpdump&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015pkg:rpm/suse/kernel-zfcpdump&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP1pkg:rpm/suse/kgraft-patch-SLE12-SP4_Update_8&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP4
< 4.12.14-lp150.12.73.1+ 76 more
- (no CPE)range: < 4.12.14-lp150.12.73.1
- (no CPE)range: < 4.12.14-lp151.28.16.1
- (no CPE)range: < 4.12.14-lp150.12.73.1
- (no CPE)range: < 4.12.14-lp151.28.16.1
- (no CPE)range: < 4.12.14-lp150.12.73.1
- (no CPE)range: < 4.12.14-lp151.28.16.1
- (no CPE)range: < 4.12.14-lp150.12.73.1
- (no CPE)range: < 4.12.14-lp151.28.16.1
- (no CPE)range: < 4.12.14-lp150.12.73.1
- (no CPE)range: < 4.12.14-lp151.28.16.1
- (no CPE)range: < 4.12.14-lp150.12.73.1
- (no CPE)range: < 4.12.14-lp151.28.16.1
- (no CPE)range: < 4.12.14-lp150.12.73.1
- (no CPE)range: < 4.12.14-lp151.28.16.1
- (no CPE)range: < 4.12.14-lp150.12.73.1
- (no CPE)range: < 4.12.14-lp151.28.16.1
- (no CPE)range: < 4.12.14-lp150.12.73.1
- (no CPE)range: < 4.12.14-lp151.28.16.1
- (no CPE)range: < 4.12.14-5.41.1
- (no CPE)range: < 4.12.14-8.16.1
- (no CPE)range: < 4.12.14-6.26.1
- (no CPE)range: < 4.12.14-6.26.1
- (no CPE)range: < 4.12.14-95.32.1
- (no CPE)range: < 4.12.14-95.32.1
- (no CPE)range: < 4.12.14-150.35.1
- (no CPE)range: < 4.12.14-197.18.1
- (no CPE)range: < 4.12.14-150.35.1
- (no CPE)range: < 4.12.14-197.18.1
- (no CPE)range: < 4.12.14-150.35.1
- (no CPE)range: < 4.12.14-197.18.1
- (no CPE)range: < 4.12.14-150.35.1
- (no CPE)range: < 4.12.14-197.18.1
- (no CPE)range: < 4.12.14-95.32.1
- (no CPE)range: < 4.12.14-95.32.1
- (no CPE)range: < 4.12.14-95.32.1
- (no CPE)range: < 4.12.14-150.35.1
- (no CPE)range: < 4.12.14-197.18.1
- (no CPE)range: < 4.12.14-150.35.1
- (no CPE)range: < 4.12.14-197.18.1
- (no CPE)range: < 4.12.14-95.32.1
- (no CPE)range: < 1-3.3.1
- (no CPE)range: < 1-1.3.1
- (no CPE)range: < 4.12.14-150.35.1
- (no CPE)range: < 4.12.14-197.18.1
- (no CPE)range: < 4.12.14-95.32.1
- (no CPE)range: < 4.12.14-8.6.1
- (no CPE)range: < 4.12.14-14.11.1
- (no CPE)range: < 4.12.14-8.6.1
- (no CPE)range: < 4.12.14-14.11.1
- (no CPE)range: < 4.12.14-5.41.1
- (no CPE)range: < 4.12.14-8.16.1
- (no CPE)range: < 4.12.14-6.26.1
- (no CPE)range: < 4.12.14-6.26.1
- (no CPE)range: < 4.12.14-95.32.1
- (no CPE)range: < 4.12.14-150.35.1
- (no CPE)range: < 4.12.14-197.18.1
- (no CPE)range: < 4.12.14-150.35.1
- (no CPE)range: < 4.12.14-197.18.1
- (no CPE)range: < 4.12.14-95.32.1
- (no CPE)range: < 4.12.14-95.32.1
- (no CPE)range: < 4.12.14-8.6.1
- (no CPE)range: < 4.12.14-14.11.1
- (no CPE)range: < 4.12.14-5.41.1
- (no CPE)range: < 4.12.14-8.16.1
- (no CPE)range: < 4.12.14-6.26.1
- (no CPE)range: < 4.12.14-6.26.1
- (no CPE)range: < 4.12.14-95.32.1
- (no CPE)range: < 4.12.14-150.35.1
- (no CPE)range: < 4.12.14-197.18.1
- (no CPE)range: < 4.12.14-95.32.1
- (no CPE)range: < 4.12.14-95.32.1
- (no CPE)range: < 4.12.14-8.6.1
- (no CPE)range: < 4.12.14-14.11.1
- (no CPE)range: < 4.12.14-150.35.1
- (no CPE)range: < 4.12.14-150.35.1
- (no CPE)range: < 4.12.14-197.18.1
- (no CPE)range: < 1-6.3.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
14- lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.htmlmitrevendor-advisoryx_refsource_SUSE
- lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.htmlmitrevendor-advisoryx_refsource_SUSE
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3RUDQJXRJQVGHCGR4YZWTQ3ECBI7TXH/mitrevendor-advisoryx_refsource_FEDORA
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4JZ6AEUKFWBHQAROGMQARJ274PQP2QP/mitrevendor-advisoryx_refsource_FEDORA
- usn.ubuntu.com/4144-1/mitrevendor-advisoryx_refsource_UBUNTU
- usn.ubuntu.com/4147-1/mitrevendor-advisoryx_refsource_UBUNTU
- git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/mitrex_refsource_MISC
- github.com/torvalds/linux/commit/1fb254aa983bf190cfd685d40c64a480a9bafaeemitrex_refsource_MISC
- lists.debian.org/debian-lts-announce/2019/09/msg00014.htmlmitremailing-listx_refsource_MLIST
- lists.debian.org/debian-lts-announce/2019/09/msg00015.htmlmitremailing-listx_refsource_MLIST
- lore.kernel.org/linux-xfs/20190823035528.GH1037422%40magnolia/mitrex_refsource_MISC
- lore.kernel.org/linux-xfs/20190823192433.GA8736%40eldamar.localmitrex_refsource_MISC
- security.netapp.com/advisory/ntap-20191004-0001/mitrex_refsource_CONFIRM
- support.f5.com/csp/article/K32592426mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.