### [CVE-2019-25044](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25044) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description The block subsystem in the Linux kernel before 5.2 has a use-after-free that can lead to arbitrary code execution in the kernel context and privilege escalation, aka CID-c3e2219216c9. This is related to blk_mq_free_rqs and blk_cleanup_queue. ### POC #### Reference - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c3e2219216c92919a6bd1711f340f5faa98695e6 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c3e2219216c92919a6bd1711f340f5faa98695e6 #### Github No PoCs found on GitHub currently.