Vulnerability Description
Overlayfs in the Linux kernel and shiftfs, a non-upstream patch to the Linux kernel included in the Ubuntu 5.0 and 5.3 kernel series, both replace vma->vm_file in their mmap handlers. On error the original value is not restored, and the reference is put for the file to which vm_file points. On upstream kernels this is not an issue, as no callers dereference vm_file following after call_mmap() returns an error. However, the aufs patchs change mmap_region() to replace the fput() using a local variable with vma_fput(), which will fput() vm_file, leading to a refcount underflow.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | 5.0 |
| Canonical | Ubuntu Linux | 18.04 |
Related Weaknesses (CWE)
References
- https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/eoan/commit/?Mailing ListPatchThird Party Advisory
- https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/eoan/commit/?Mailing ListPatchThird Party Advisory
- https://usn.ubuntu.com/usn/usn-4208-1Third Party Advisory
- https://usn.ubuntu.com/usn/usn-4209-1Third Party Advisory
- https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/eoan/commit/?Mailing ListPatchThird Party Advisory
- https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/eoan/commit/?Mailing ListPatchThird Party Advisory
- https://usn.ubuntu.com/usn/usn-4208-1Third Party Advisory
- https://usn.ubuntu.com/usn/usn-4209-1Third Party Advisory
FAQ
What is CVE-2019-15794?
CVE-2019-15794 is a vulnerability with a CVSS score of 7.1 (HIGH). Overlayfs in the Linux kernel and shiftfs, a non-upstream patch to the Linux kernel included in the Ubuntu 5.0 and 5.3 kernel series, both replace vma->vm_file in their mmap handlers. On error the ori...
How severe is CVE-2019-15794?
CVE-2019-15794 has been rated HIGH with a CVSS base score of 7.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-15794?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel, Canonical Ubuntu Linux.