Vulnerability Name: | CVE-2019-19813 (CCN-173221) | ||||||||||||||||
Assigned: | 2019-12-16 | ||||||||||||||||
Published: | 2019-12-16 | ||||||||||||||||
Updated: | 2021-03-12 | ||||||||||||||||
Summary: | In the Linux kernel 5.0.21, mounting a crafted btrfs filesystem image, performing some operations, and then making a syncfs system call can lead to a use-after-free in __mutex_lock in kernel/locking/mutex.c. This is related to mutex_can_spin_on_owner in kernel/locking/mutex.c, __btrfs_qgroup_free_meta in fs/btrfs/qgroup.c, and btrfs_insert_delayed_items in fs/btrfs/delayed-inode.c. | ||||||||||||||||
CVSS v3 Severity: | 5.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) 4.9 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:U/RC:R)
3.5 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:U/RC:R)
| ||||||||||||||||
CVSS v2 Severity: | 7.1 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:C)
| ||||||||||||||||
Vulnerability Type: | CWE-416 | ||||||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2019-19813 Source: XF Type: UNKNOWN linux-kernel-cve201919813-dos(173221) Source: CCN Type: GitHub Web site CVE-2019-19813 Source: MISC Type: Exploit, Third Party Advisory https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19813 Source: MLIST Type: Mailing List, Third Party Advisory [debian-lts-announce] 20200928 [SECURITY] [DLA 2385-1] linux-4.19 security update Source: MLIST Type: Mailing List, Third Party Advisory [debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update Source: CONFIRM Type: Third Party Advisory https://security.netapp.com/advisory/ntap-20200103-0001/ Source: UBUNTU Type: Third Party Advisory USN-4414-1 Source: CCN Type: Linux kernel Web site The Linux Kernel Archives | ||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration 4: Configuration 5: Configuration 6: Configuration 7: Configuration 8: Configuration 9: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||
Oval Definitions | |||||||||||||||||
| |||||||||||||||||
BACK |