vulnerability
Amazon Linux AMI 2: CVE-2019-19319: Security patch for kernel, kernel-livepatch-4.14.173-137.228, kernel-livepatch-4.14.173-137.229, kernel-livepatch-4.14.177-139.253, kernel-livepatch-4.14.177-139.254 (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 6 | (AV:L/AC:M/Au:M/C:C/I:C/A:C) | Nov 27, 2019 | Jun 4, 2020 | Jan 28, 2025 |
Severity
6
CVSS
(AV:L/AC:M/Au:M/C:C/I:C/A:C)
Published
Nov 27, 2019
Added
Jun 4, 2020
Modified
Jan 28, 2025
Description
In the Linux kernel before 5.2, a setxattr operation, after a mount of a crafted ext4 image, can cause a slab-out-of-bounds write access because of an ext4_xattr_set_entry use-after-free in fs/ext4/xattr.c when a large old_size value is used in a memset call, aka CID-345c0dbf3a30.
Solutions
amazon-linux-ami-2-upgrade-kernelamazon-linux-ami-2-upgrade-kernel-debuginfoamazon-linux-ami-2-upgrade-kernel-debuginfo-common-aarch64amazon-linux-ami-2-upgrade-kernel-debuginfo-common-x86_64amazon-linux-ami-2-upgrade-kernel-develamazon-linux-ami-2-upgrade-kernel-headersamazon-linux-ami-2-upgrade-kernel-livepatch-4-14-173-137-228amazon-linux-ami-2-upgrade-kernel-livepatch-4-14-173-137-228-debuginfoamazon-linux-ami-2-upgrade-kernel-livepatch-4-14-173-137-229amazon-linux-ami-2-upgrade-kernel-livepatch-4-14-173-137-229-debuginfoamazon-linux-ami-2-upgrade-kernel-livepatch-4-14-177-139-253amazon-linux-ami-2-upgrade-kernel-livepatch-4-14-177-139-253-debuginfoamazon-linux-ami-2-upgrade-kernel-livepatch-4-14-177-139-254amazon-linux-ami-2-upgrade-kernel-livepatch-4-14-177-139-254-debuginfoamazon-linux-ami-2-upgrade-kernel-livepatch-4-14-181-140-257amazon-linux-ami-2-upgrade-kernel-toolsamazon-linux-ami-2-upgrade-kernel-tools-debuginfoamazon-linux-ami-2-upgrade-kernel-tools-develamazon-linux-ami-2-upgrade-perfamazon-linux-ami-2-upgrade-perf-debuginfoamazon-linux-ami-2-upgrade-python-perfamazon-linux-ami-2-upgrade-python-perf-debuginfo
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.