CVE-2019-11833

fs/ext4/extents.c in the Linux kernel through 5.1.2 does not zero out the unused memory region in the extent tree block, which might allow local users to obtain sensitive information by reading uninitialized data in the filesystem.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00071.html Broken Link
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html Broken Link
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html Broken Link
http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/108372 Broken Link Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2019:2029 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:2043 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:3309 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:3517 Third Party Advisory
https://github.com/torvalds/linux/commit/592acbf16821288ecdc4192c47e3774a4c48bb64 Patch Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/06/msg00010.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/06/msg00011.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GJGZIMGB72TL7OGWRMHIL43WHXFQWU4X/
https://seclists.org/bugtraq/2019/Jun/26 Mailing List Third Party Advisory
https://usn.ubuntu.com/4068-1/ Third Party Advisory
https://usn.ubuntu.com/4068-2/ Third Party Advisory
https://usn.ubuntu.com/4069-1/ Third Party Advisory
https://usn.ubuntu.com/4069-2/ Third Party Advisory
https://usn.ubuntu.com/4076-1/ Third Party Advisory
https://usn.ubuntu.com/4095-2/ Third Party Advisory
https://usn.ubuntu.com/4118-1/ Third Party Advisory
https://www.debian.org/security/2019/dsa-4465 Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00071.html Broken Link
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html Broken Link
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html Broken Link
http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/108372 Broken Link Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2019:2029 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:2043 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:3309 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:3517 Third Party Advisory
https://github.com/torvalds/linux/commit/592acbf16821288ecdc4192c47e3774a4c48bb64 Patch Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/06/msg00010.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/06/msg00011.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GJGZIMGB72TL7OGWRMHIL43WHXFQWU4X/
https://seclists.org/bugtraq/2019/Jun/26 Mailing List Third Party Advisory
https://usn.ubuntu.com/4068-1/ Third Party Advisory
https://usn.ubuntu.com/4068-2/ Third Party Advisory
https://usn.ubuntu.com/4069-1/ Third Party Advisory
https://usn.ubuntu.com/4069-2/ Third Party Advisory
https://usn.ubuntu.com/4076-1/ Third Party Advisory
https://usn.ubuntu.com/4095-2/ Third Party Advisory
https://usn.ubuntu.com/4118-1/ Third Party Advisory
https://www.debian.org/security/2019/dsa-4465 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_real_time:7:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_real_time:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:7:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

History

21 Nov 2024, 04:21

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00071.html - Broken Link () http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00071.html - Broken Link
References () http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html - Broken Link () http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html - Broken Link
References () http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html - Broken Link () http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html - Broken Link
References () http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html - Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html - Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/bid/108372 - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/108372 - Broken Link, Third Party Advisory, VDB Entry
References () https://access.redhat.com/errata/RHSA-2019:2029 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2019:2029 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2019:2043 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2019:2043 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2019:3309 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2019:3309 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2019:3517 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2019:3517 - Third Party Advisory
References () https://github.com/torvalds/linux/commit/592acbf16821288ecdc4192c47e3774a4c48bb64 - Patch, Third Party Advisory () https://github.com/torvalds/linux/commit/592acbf16821288ecdc4192c47e3774a4c48bb64 - Patch, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2019/06/msg00010.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2019/06/msg00010.html - Mailing List, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2019/06/msg00011.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2019/06/msg00011.html - Mailing List, Third Party Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GJGZIMGB72TL7OGWRMHIL43WHXFQWU4X/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GJGZIMGB72TL7OGWRMHIL43WHXFQWU4X/ -
References () https://seclists.org/bugtraq/2019/Jun/26 - Mailing List, Third Party Advisory () https://seclists.org/bugtraq/2019/Jun/26 - Mailing List, Third Party Advisory
References () https://usn.ubuntu.com/4068-1/ - Third Party Advisory () https://usn.ubuntu.com/4068-1/ - Third Party Advisory
References () https://usn.ubuntu.com/4068-2/ - Third Party Advisory () https://usn.ubuntu.com/4068-2/ - Third Party Advisory
References () https://usn.ubuntu.com/4069-1/ - Third Party Advisory () https://usn.ubuntu.com/4069-1/ - Third Party Advisory
References () https://usn.ubuntu.com/4069-2/ - Third Party Advisory () https://usn.ubuntu.com/4069-2/ - Third Party Advisory
References () https://usn.ubuntu.com/4076-1/ - Third Party Advisory () https://usn.ubuntu.com/4076-1/ - Third Party Advisory
References () https://usn.ubuntu.com/4095-2/ - Third Party Advisory () https://usn.ubuntu.com/4095-2/ - Third Party Advisory
References () https://usn.ubuntu.com/4118-1/ - Third Party Advisory () https://usn.ubuntu.com/4118-1/ - Third Party Advisory
References () https://www.debian.org/security/2019/dsa-4465 - Third Party Advisory () https://www.debian.org/security/2019/dsa-4465 - Third Party Advisory

07 Nov 2023, 03:03

Type Values Removed Values Added
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GJGZIMGB72TL7OGWRMHIL43WHXFQWU4X/', 'name': 'FEDORA-2019-48b34fc991', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GJGZIMGB72TL7OGWRMHIL43WHXFQWU4X/ -

Information

Published : 2019-05-15 13:29

Updated : 2024-11-21 04:21


NVD link : CVE-2019-11833

Mitre link : CVE-2019-11833

CVE.ORG link : CVE-2019-11833


JSON object : View

Products Affected

redhat

  • enterprise_linux_server
  • enterprise_linux
  • enterprise_linux_for_real_time
  • enterprise_linux_desktop
  • enterprise_linux_for_real_time_for_nfv
  • enterprise_linux_for_real_time_for_nfv_tus
  • enterprise_linux_server_aus
  • enterprise_linux_eus
  • enterprise_linux_server_tus
  • enterprise_linux_for_real_time_tus
  • enterprise_linux_workstation

canonical

  • ubuntu_linux

linux

  • linux_kernel

debian

  • debian_linux

fedoraproject

  • fedora
CWE
CWE-908

Use of Uninitialized Resource