Unrated severityNVD Advisory· Published Dec 31, 2019· Updated Aug 5, 2024
CVE-2019-19927
CVE-2019-19927
Description
In the Linux kernel 5.0.0-rc7 (as distributed in ubuntu/linux.git on kernel.ubuntu.com), mounting a crafted f2fs filesystem image and performing some operations can lead to slab-out-of-bounds read access in ttm_put_pages in drivers/gpu/drm/ttm/ttm_page_alloc.c. This is related to the vmwgfx or ttm module.
Affected products
51- Linux/Linux kerneldescription
- osv-coords50 versionspkg:rpm/opensuse/kernel-debug&distro=openSUSE%20Leap%2015.1pkg:rpm/opensuse/kernel-default&distro=openSUSE%20Leap%2015.1pkg:rpm/opensuse/kernel-docs&distro=openSUSE%20Leap%2015.1pkg:rpm/opensuse/kernel-kvmsmall&distro=openSUSE%20Leap%2015.1pkg:rpm/opensuse/kernel-obs-build&distro=openSUSE%20Leap%2015.1pkg:rpm/opensuse/kernel-obs-qa&distro=openSUSE%20Leap%2015.1pkg:rpm/opensuse/kernel-source&distro=openSUSE%20Leap%2015.1pkg:rpm/opensuse/kernel-syms&distro=openSUSE%20Leap%2015.1pkg:rpm/opensuse/kernel-vanilla&distro=openSUSE%20Leap%2015.1pkg:rpm/suse/kernel-azure&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2015%20SP1pkg:rpm/suse/kernel-azure&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/kernel-azure&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2012%20SP5pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2015%20SP1pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP5pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP1pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP1pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Legacy%2015%20SP1pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2012%20SP5pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2015%20SP1pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP1pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5pkg:rpm/suse/kernel-livepatch-SLE15-SP1_Update_9&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP1pkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP1pkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5pkg:rpm/suse/kernel-rt_debug&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP5pkg:rpm/suse/kernel-rt_debug&distro=SUSE%20Real%20Time%20Module%2015%20SP1pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP5pkg:rpm/suse/kernel-rt&distro=SUSE%20Real%20Time%20Module%2015%20SP1pkg:rpm/suse/kernel-source-azure&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2015%20SP1pkg:rpm/suse/kernel-source-azure&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/kernel-source-azure&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP1pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP1pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP5pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Real%20Time%20Module%2015%20SP1pkg:rpm/suse/kernel-syms-azure&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2015%20SP1pkg:rpm/suse/kernel-syms-azure&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/kernel-syms-azure&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP1pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/kernel-syms-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP5pkg:rpm/suse/kernel-syms-rt&distro=SUSE%20Real%20Time%20Module%2015%20SP1pkg:rpm/suse/kernel-zfcpdump&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP1pkg:rpm/suse/kgraft-patch-SLE12-SP5_Update_3&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP5
< 4.12.14-lp151.28.40.1+ 49 more
- (no CPE)range: < 4.12.14-lp151.28.40.1
- (no CPE)range: < 4.12.14-lp151.28.40.1
- (no CPE)range: < 4.12.14-lp151.28.40.1
- (no CPE)range: < 4.12.14-lp151.28.40.1
- (no CPE)range: < 4.12.14-lp151.28.40.1
- (no CPE)range: < 4.12.14-lp151.28.40.1
- (no CPE)range: < 4.12.14-lp151.28.40.1
- (no CPE)range: < 4.12.14-lp151.28.40.1
- (no CPE)range: < 4.12.14-lp151.28.40.1
- (no CPE)range: < 4.12.14-8.27.1
- (no CPE)range: < 4.12.14-16.10.1
- (no CPE)range: < 4.12.14-16.10.1
- (no CPE)range: < 4.12.14-122.17.1
- (no CPE)range: < 4.12.14-197.34.1
- (no CPE)range: < 4.12.14-122.17.1
- (no CPE)range: < 4.12.14-197.34.1
- (no CPE)range: < 4.12.14-197.34.1
- (no CPE)range: < 4.12.14-197.34.1
- (no CPE)range: < 4.12.14-122.17.1
- (no CPE)range: < 4.12.14-122.17.1
- (no CPE)range: < 4.12.14-122.17.1
- (no CPE)range: < 4.12.14-197.34.1
- (no CPE)range: < 4.12.14-197.34.1
- (no CPE)range: < 4.12.14-122.17.2
- (no CPE)range: < 1-3.5.1
- (no CPE)range: < 4.12.14-197.34.1
- (no CPE)range: < 4.12.14-122.17.1
- (no CPE)range: < 4.12.14-6.3.1
- (no CPE)range: < 4.12.14-14.17.1
- (no CPE)range: < 4.12.14-6.3.1
- (no CPE)range: < 4.12.14-14.17.1
- (no CPE)range: < 4.12.14-8.27.1
- (no CPE)range: < 4.12.14-16.10.1
- (no CPE)range: < 4.12.14-16.10.1
- (no CPE)range: < 4.12.14-197.34.1
- (no CPE)range: < 4.12.14-197.34.1
- (no CPE)range: < 4.12.14-122.17.1
- (no CPE)range: < 4.12.14-122.17.1
- (no CPE)range: < 4.12.14-6.3.1
- (no CPE)range: < 4.12.14-14.17.1
- (no CPE)range: < 4.12.14-8.27.1
- (no CPE)range: < 4.12.14-16.10.1
- (no CPE)range: < 4.12.14-16.10.1
- (no CPE)range: < 4.12.14-197.34.1
- (no CPE)range: < 4.12.14-122.17.1
- (no CPE)range: < 4.12.14-122.17.1
- (no CPE)range: < 4.12.14-6.3.1
- (no CPE)range: < 4.12.14-14.17.1
- (no CPE)range: < 4.12.14-197.34.1
- (no CPE)range: < 1-8.5.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.htmlmitrevendor-advisoryx_refsource_SUSE
- github.com/bobfuzzer/CVE/tree/master/CVE-2019-19927mitrex_refsource_MISC
- github.com/torvalds/linux/commit/453393369dc9806d2455151e329c599684762428mitrex_refsource_MISC
- github.com/torvalds/linux/commit/a66477b0efe511d98dde3e4aaeb189790e6f0a39mitrex_refsource_MISC
- github.com/torvalds/linux/commit/ac1e516d5a4c56bf0cb4a3dfc0672f689131cfd4mitrex_refsource_MISC
- security.netapp.com/advisory/ntap-20200204-0002/mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.