Bug 1831055 (CVE-2019-15794) - CVE-2019-15794 kernel: Overlayfs in the Linux kernel and shiftfs not restoring original value on error leading to a refcount underflow
Summary: CVE-2019-15794 kernel: Overlayfs in the Linux kernel and shiftfs not restori...
Alias: CVE-2019-15794
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
Depends On: 1832271 1832276 1832277
Blocks: 1831035
TreeView+ depends on / blocked
Reported: 2020-05-04 14:30 UTC by Michael Kaplan
Modified: 2023-09-26 14:05 UTC (History)
47 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in the Linux kernel. In Overlayfs, vma->vm_file was replaced in the mmap handlers and, on errors, the original value is not restored. A local attacker with special user privilege (or root) can cause a kernel internal information leak. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Clone Of:
Last Closed: 2021-12-15 11:30:40 UTC

Attachments (Terms of Use)

Description Michael Kaplan 2020-05-04 14:30:54 UTC
An issue was found in Overlayfs in the Linux kernel were it replace vma->vm_file in their mmap handlers. On error the original value is not restored, and the reference is put for the file to which vm_file points. 

On upstream kernels this is not an issue, as no callers dereference vm_file following after call_mmap() returns an error. However, the aufs patchs change mmap_region() to replace the fput() using a local variable with vma_fput(), which will fput() vm_file, leading to a refcount underflow. This can lead to an invalid address access and a DoS problem.



Comment 2 Michael Kaplan 2020-05-06 12:41:14 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 1832271]

Comment 4 Rohit Keshri 2020-05-06 13:02:52 UTC

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Comment 14 Wade Mealing 2020-05-12 00:57:58 UTC
The use case of compiling a third party AUFS (filesystem) to allow this flaw to be triggered, means that this flaw is not able to be triggered for most users of overlayfs in Red Hat Enterprise Linux.

Note You need to log in before you can comment on or make changes to this bug.