CVE-2019-19134

Current Description

Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/marvell/mwifiex/pcie.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures, aka CID-d10dcb615c8e.

Basic Data

PublishedNovember 18, 2019
Last ModifiedJanuary 09, 2020
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-400
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:L/AC:L/Au:N/C:N/I:N/A:P
CVSS 2 - Access VectorLOCAL
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactNONE
CVSS 2 - Availability ImpactPARTIAL
CVSS 2 - Base Score2.1
SeverityLOW
Exploitability Score3.9
Impact Score2.9
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSLinuxLinux Kernel********5.3.11
  • OR - Configuration 2
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSFedoraprojectFedora30*******
    2.3OSFedoraprojectFedora31*******
    2.3OSOpensuseLeap15.1*******

Vulnerable Software List

VendorProductVersions
Opensuse Leap 15.1
Linux Linux Kernel *
Fedoraproject Fedora 30, 31

References

NameSourceURLTags
openSUSE-SU-2019:2675http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.htmlSUSEThird Party Advisory
http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.htmlhttp://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-UpdateMISC
https://github.com/torvalds/linux/commit/d10dcb615c8e29d403a24d35f8310a7a53e3050chttps://github.com/torvalds/linux/commit/d10dcb615c8e29d403a24d35f8310a7a53e3050cMISCPatch Third Party Advisory
[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security updatehttps://lists.debian.org/debian-lts-announce/2020/01/msg00013.htmlMLIST
[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security updatehttps://lists.debian.org/debian-lts-announce/2020/03/msg00001.htmlMLIST
FEDORA-2019-021c968423https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3PSDFEDORAThird Party Advisory
FEDORA-2019-34a75d7e61https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PY7LJFEDORAThird Party Advisory
20200109 [slackware-security] Slackware 14.2 kernel (SSA:2020-008-01)https://seclists.org/bugtraq/2020/Jan/10BUGTRAQ
https://security.netapp.com/advisory/ntap-20191205-0001/https://security.netapp.com/advisory/ntap-20191205-0001/CONFIRMThird Party Advisory
USN-4254-1https://usn.ubuntu.com/4254-1/UBUNTU
USN-4254-2https://usn.ubuntu.com/4254-2/UBUNTU
USN-4284-1https://usn.ubuntu.com/4284-1/UBUNTU
USN-4285-1https://usn.ubuntu.com/4285-1/UBUNTU
USN-4287-1https://usn.ubuntu.com/4287-1/UBUNTU
USN-4287-2https://usn.ubuntu.com/4287-2/UBUNTU