### [CVE-2019-19319](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19319) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description In the Linux kernel before 5.2, a setxattr operation, after a mount of a crafted ext4 image, can cause a slab-out-of-bounds write access because of an ext4_xattr_set_entry use-after-free in fs/ext4/xattr.c when a large old_size value is used in a memset call, aka CID-345c0dbf3a30. ### POC #### Reference - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=345c0dbf3a30 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=345c0dbf3a30 - https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19319 - https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19319 #### Github No PoCs found on GitHub currently.