Bug 1158821 - (CVE-2019-19449) VUL-1: CVE-2019-19449: kernel-source: mounting a crafted f2fs filesystem image can lead to slab-out-of-bounds read access in f2fs_build_segment_manager in fs/f2fs/segment.c, related to init_min_max_mtime in fs/f2
(CVE-2019-19449)
VUL-1: CVE-2019-19449: kernel-source: mounting a crafted f2fs filesystem imag...
Status: RESOLVED INVALID
Classification: Novell Products
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents
unspecified
Other Other
: P5 - None : Minor
: ---
Assigned To: Security Team bot
Security Team bot
https://smash.suse.de/issue/248546/
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2019-12-09 16:25 UTC by Wolfgang Frisch
Modified: 2021-05-10 12:45 UTC (History)
4 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Wolfgang Frisch 2019-12-09 16:25:07 UTC
CVE-2019-19449

In the Linux kernel 5.0.21, mounting a crafted f2fs filesystem image can lead to
slab-out-of-bounds read access in f2fs_build_segment_manager in
fs/f2fs/segment.c, related to init_min_max_mtime in fs/f2fs/segment.c (because
the second argument to get_seg_entry is not validated).

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-19449
http://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19449.html
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19449
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19449
Comment 1 Takashi Iwai 2019-12-09 16:36:35 UTC
f2fs is disabled on all SUSE and openSUSE releases including TW.  So we are unaffected.
Comment 2 Wolfgang Frisch 2019-12-09 16:50:45 UTC
Thanks for looking into it.

Closed.