vulnerability

Ubuntu: (Multiple Advisories) (CVE-2019-19770): Linux kernel vulnerabilities

Severity
6
CVSS
(AV:N/AC:L/Au:N/C:P/I:N/A:P)
Published
Dec 12, 2019
Added
Jan 6, 2021
Modified
Aug 18, 2025

Description

In the Linux kernel 4.19.83, there is a use-after-free (read) in the debugfs_remove function in fs/debugfs/inode.c (which is used to remove a file or directory in debugfs that was previously created with a call to another debugfs function such as debugfs_create_file). NOTE: Linux kernel developers dispute this issue as not being an issue with debugfs, instead this is an issue with misuse of debugfs within blktrace

Solutions

ubuntu-upgrade-linux-image-4-15-0-1062-oracleubuntu-upgrade-linux-image-4-15-0-1077-gkeubuntu-upgrade-linux-image-4-15-0-1077-raspi2ubuntu-upgrade-linux-image-4-15-0-1082-kvmubuntu-upgrade-linux-image-4-15-0-1091-awsubuntu-upgrade-linux-image-4-15-0-1091-gcpubuntu-upgrade-linux-image-4-15-0-1094-snapdragonubuntu-upgrade-linux-image-4-15-0-1103-azureubuntu-upgrade-linux-image-4-15-0-129-genericubuntu-upgrade-linux-image-4-15-0-129-generic-lpaeubuntu-upgrade-linux-image-4-15-0-129-lowlatencyubuntu-upgrade-linux-image-aws-hweubuntu-upgrade-linux-image-aws-lts-18-04ubuntu-upgrade-linux-image-azureubuntu-upgrade-linux-image-azure-lts-18-04ubuntu-upgrade-linux-image-gcpubuntu-upgrade-linux-image-gcp-lts-18-04ubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-hwe-16-04ubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-generic-lpae-hwe-16-04ubuntu-upgrade-linux-image-gkeubuntu-upgrade-linux-image-gke-4-15ubuntu-upgrade-linux-image-kvmubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-lowlatency-hwe-16-04ubuntu-upgrade-linux-image-oemubuntu-upgrade-linux-image-oracleubuntu-upgrade-linux-image-oracle-lts-18-04ubuntu-upgrade-linux-image-raspi2ubuntu-upgrade-linux-image-snapdragonubuntu-upgrade-linux-image-virtualubuntu-upgrade-linux-image-virtual-hwe-16-04

References

    Title
    NEW

    Explore Exposure Command

    Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.