vulnerability

Ubuntu: (Multiple Advisories) (CVE-2019-19813): Linux kernel vulnerabilities

Severity
7
CVSS
(AV:N/AC:M/Au:N/C:N/I:N/A:C)
Published
Dec 17, 2019
Added
Aug 5, 2020
Modified
Aug 18, 2025

Description

In the Linux kernel 5.0.21, mounting a crafted btrfs filesystem image, performing some operations, and then making a syncfs system call can lead to a use-after-free in __mutex_lock in kernel/locking/mutex.c. This is related to mutex_can_spin_on_owner in kernel/locking/mutex.c, __btrfs_qgroup_free_meta in fs/btrfs/qgroup.c, and btrfs_insert_delayed_items in fs/btrfs/delayed-inode.c.

Solutions

ubuntu-upgrade-linux-image-4-15-0-1046-oracleubuntu-upgrade-linux-image-4-15-0-1048-oracleubuntu-upgrade-linux-image-4-15-0-1064-gkeubuntu-upgrade-linux-image-4-15-0-1065-raspi2ubuntu-upgrade-linux-image-4-15-0-1069-kvmubuntu-upgrade-linux-image-4-15-0-107-genericubuntu-upgrade-linux-image-4-15-0-107-generic-lpaeubuntu-upgrade-linux-image-4-15-0-107-lowlatencyubuntu-upgrade-linux-image-4-15-0-1074-awsubuntu-upgrade-linux-image-4-15-0-1077-awsubuntu-upgrade-linux-image-4-15-0-1078-gcpubuntu-upgrade-linux-image-4-15-0-1081-snapdragonubuntu-upgrade-linux-image-4-15-0-109-genericubuntu-upgrade-linux-image-4-15-0-109-generic-lpaeubuntu-upgrade-linux-image-4-15-0-109-lowlatencyubuntu-upgrade-linux-image-4-15-0-1091-azureubuntu-upgrade-linux-image-4-15-0-1091-oemubuntu-upgrade-linux-image-4-4-0-1085-awsubuntu-upgrade-linux-image-4-4-0-1087-kvmubuntu-upgrade-linux-image-4-4-0-1121-awsubuntu-upgrade-linux-image-4-4-0-1145-raspi2ubuntu-upgrade-linux-image-4-4-0-1149-snapdragonubuntu-upgrade-linux-image-4-4-0-201-genericubuntu-upgrade-linux-image-4-4-0-201-generic-lpaeubuntu-upgrade-linux-image-4-4-0-201-lowlatencyubuntu-upgrade-linux-image-4-4-0-201-powerpc-e500mcubuntu-upgrade-linux-image-4-4-0-201-powerpc-smpubuntu-upgrade-linux-image-4-4-0-201-powerpc64-embubuntu-upgrade-linux-image-4-4-0-201-powerpc64-smpubuntu-upgrade-linux-image-awsubuntu-upgrade-linux-image-aws-hweubuntu-upgrade-linux-image-aws-lts-18-04ubuntu-upgrade-linux-image-azureubuntu-upgrade-linux-image-azure-lts-18-04ubuntu-upgrade-linux-image-gcpubuntu-upgrade-linux-image-gcp-lts-18-04ubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-hwe-16-04ubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-generic-lpae-hwe-16-04ubuntu-upgrade-linux-image-generic-lpae-lts-xenialubuntu-upgrade-linux-image-generic-lts-xenialubuntu-upgrade-linux-image-gkeubuntu-upgrade-linux-image-gke-4-15ubuntu-upgrade-linux-image-kvmubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-lowlatency-hwe-16-04ubuntu-upgrade-linux-image-lowlatency-lts-xenialubuntu-upgrade-linux-image-oemubuntu-upgrade-linux-image-oracleubuntu-upgrade-linux-image-oracle-lts-18-04ubuntu-upgrade-linux-image-powerpc-e500mcubuntu-upgrade-linux-image-powerpc-e500mc-lts-xenialubuntu-upgrade-linux-image-powerpc-smpubuntu-upgrade-linux-image-powerpc-smp-lts-xenialubuntu-upgrade-linux-image-powerpc64-embubuntu-upgrade-linux-image-powerpc64-emb-lts-xenialubuntu-upgrade-linux-image-powerpc64-smpubuntu-upgrade-linux-image-powerpc64-smp-lts-xenialubuntu-upgrade-linux-image-raspi2ubuntu-upgrade-linux-image-snapdragonubuntu-upgrade-linux-image-virtualubuntu-upgrade-linux-image-virtual-hwe-16-04ubuntu-upgrade-linux-image-virtual-lts-xenial

References

    Title
    NEW

    Explore Exposure Command

    Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.