CVE-2019-19148

Current Description

A memory leak in the crypto_report() function in crypto/crypto_user_base.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering crypto_report_alg() failures, aka CID-ffdde5932042.

Basic Data

PublishedNovember 18, 2019
Last ModifiedMay 04, 2020
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-400
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:L/AC:M/Au:N/C:N/I:N/A:C
CVSS 2 - Access VectorLOCAL
CVSS 2 - Access ComplexityMEDIUM
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactNONE
CVSS 2 - Availability ImpactCOMPLETE
CVSS 2 - Base Score4.7
SeverityMEDIUM
Exploitability Score3.4
Impact Score6.9
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSLinuxLinux Kernel********5.3.11
  • OR - Configuration 2
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSCanonicalUbuntu Linux14.04***esm***
    2.3OSCanonicalUbuntu Linux16.04***lts***
    2.3OSCanonicalUbuntu Linux18.04***lts***
    2.3OSCanonicalUbuntu Linux19.10*******
    2.3OSDebianDebian Linux8.0*******
    2.3OSFedoraprojectFedora30*******
    2.3OSFedoraprojectFedora31*******
    2.3OSOpensuseLeap15.1*******
    2.3OSRedhatEnterprise Linux7.0*******
    2.3OSRedhatEnterprise Linux8.0*******

Vulnerable Software List

VendorProductVersions
Debian Debian Linux 8.0
Redhat Enterprise Linux 7.0, 8.0
Canonical Ubuntu Linux 14.04, 16.04, 18.04, 19.10
Opensuse Leap 15.1
Linux Linux Kernel *
Fedoraproject Fedora 30, 31

References

NameSourceURLTags
openSUSE-SU-2019:2675http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.htmlSUSEMailing List Third Party Advisory
http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.htmlhttp://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-UpdateMISCThird Party Advisory VDB Entry
https://github.com/torvalds/linux/commit/ffdde5932042600c6807d46c1550b28b0db6a3bchttps://github.com/torvalds/linux/commit/ffdde5932042600c6807d46c1550b28b0db6a3bcMISCPatch Third Party Advisory
[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security updatehttps://lists.debian.org/debian-lts-announce/2020/01/msg00013.htmlMLISTMailing List Third Party Advisory
[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security updatehttps://lists.debian.org/debian-lts-announce/2020/03/msg00001.htmlMLISTMailing List Third Party Advisory
FEDORA-2019-021c968423https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3PSDFEDORAMailing List Third Party Advisory
FEDORA-2019-34a75d7e61https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PY7LJFEDORAMailing List Third Party Advisory
20200109 [slackware-security] Slackware 14.2 kernel (SSA:2020-008-01)https://seclists.org/bugtraq/2020/Jan/10BUGTRAQMailing List Third Party Advisory
https://security.netapp.com/advisory/ntap-20191205-0001/https://security.netapp.com/advisory/ntap-20191205-0001/CONFIRMThird Party Advisory
USN-4254-1https://usn.ubuntu.com/4254-1/UBUNTUThird Party Advisory
USN-4254-2https://usn.ubuntu.com/4254-2/UBUNTUThird Party Advisory
USN-4258-1https://usn.ubuntu.com/4258-1/UBUNTUThird Party Advisory
USN-4284-1https://usn.ubuntu.com/4284-1/UBUNTUThird Party Advisory
USN-4287-1https://usn.ubuntu.com/4287-1/UBUNTUThird Party Advisory
USN-4287-2https://usn.ubuntu.com/4287-2/UBUNTUThird Party Advisory