CVE-2019-19039

Public Exploit

Description

__btrfs_free_extent in fs/btrfs/extent-tree.c in the Linux kernel through 5.3.12 calls btrfs_print_leaf in a certain ENOENT case, which allows local users to obtain potentially sensitive information about register values via the dmesg program. NOTE: The BTRFS development team disputes this issues as not being a vulnerability because “1) The kernel provide facilities to restrict access to dmesg - dmesg_restrict=1 sysctl option. So it's really up to the system administrator to judge whether dmesg access shall be disallowed or not. 2) WARN/WARN_ON are widely used macros in the linux kernel. If this CVE is considered valid this would mean there are literally thousands CVE lurking in the kernel - something which clearly is not the case.

Category

5.5
CVSS
Severity: Medium
CVSS 3.1 •
CVSS 2.0 •
EPSS 0.49%
Vendor Advisory ubuntu.com
Affected: n/a n/a
Published at:
Updated at:

References

Link Tags
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19039 third party advisory exploit
https://usn.ubuntu.com/4414-1/ third party advisory vendor advisory
https://lists.debian.org/debian-lts-announce/2020/12/msg00015.html third party advisory mailing list

Frequently Asked Questions

What is the severity of CVE-2019-19039?
CVE-2019-19039 has been scored as a medium severity vulnerability.
How to fix CVE-2019-19039?
To fix CVE-2019-19039, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2019-19039 being actively exploited in the wild?
It is possible that CVE-2019-19039 is being exploited or will be exploited in a near future based on public information. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.