CVE-2019-19165

Current Description

A memory leak in the bfad_im_get_stats() function in drivers/scsi/bfa/bfad_attr.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering bfa_port_get_stats() failures, aka CID-0e62395da2bd.

Basic Data

PublishedNovember 18, 2019
Last ModifiedMay 04, 2020
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-400
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:L/AC:M/Au:N/C:N/I:N/A:C
CVSS 2 - Access VectorLOCAL
CVSS 2 - Access ComplexityMEDIUM
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactNONE
CVSS 2 - Availability ImpactCOMPLETE
CVSS 2 - Base Score4.7
SeverityMEDIUM
Exploitability Score3.4
Impact Score6.9
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSLinuxLinux Kernel********5.3.11
  • OR - Configuration 2
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSCanonicalUbuntu Linux14.04***esm***
    2.3OSCanonicalUbuntu Linux16.04***lts***
    2.3OSCanonicalUbuntu Linux18.04***lts***
    2.3OSCanonicalUbuntu Linux19.10*******
    2.3OSDebianDebian Linux8.0*******
    2.3OSFedoraprojectFedora30*******
    2.3OSFedoraprojectFedora31*******
    2.3OSOpensuseLeap15.1*******
    2.3OSRedhatEnterprise Linux7.0*******
    2.3OSRedhatEnterprise Linux8.0*******

Vulnerable Software List

VendorProductVersions
Debian Debian Linux 8.0
Redhat Enterprise Linux 7.0, 8.0
Canonical Ubuntu Linux 14.04, 16.04, 18.04, 19.10
Opensuse Leap 15.1
Linux Linux Kernel *
Fedoraproject Fedora 30, 31

References

NameSourceURLTags
openSUSE-SU-2020:0336http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.htmlSUSEMailing List Third Party Advisory
https://github.com/torvalds/linux/commit/0e62395da2bd5166d7c9e14cbc7503b256a34cb0https://github.com/torvalds/linux/commit/0e62395da2bd5166d7c9e14cbc7503b256a34cb0MISCPatch Third Party Advisory
[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security updatehttps://lists.debian.org/debian-lts-announce/2020/01/msg00013.htmlMLISTMailing List Third Party Advisory
[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security updatehttps://lists.debian.org/debian-lts-announce/2020/03/msg00001.htmlMLISTMailing List Third Party Advisory
FEDORA-2019-021c968423https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3PSDFEDORAMailing List Third Party Advisory
FEDORA-2019-34a75d7e61https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PY7LJFEDORAMailing List Third Party Advisory
https://security.netapp.com/advisory/ntap-20191205-0001/https://security.netapp.com/advisory/ntap-20191205-0001/CONFIRMThird Party Advisory
USN-4286-1https://usn.ubuntu.com/4286-1/UBUNTUThird Party Advisory
USN-4286-2https://usn.ubuntu.com/4286-2/UBUNTUThird Party Advisory
USN-4300-1https://usn.ubuntu.com/4300-1/UBUNTUThird Party Advisory
USN-4301-1https://usn.ubuntu.com/4301-1/UBUNTUThird Party Advisory
USN-4302-1https://usn.ubuntu.com/4302-1/UBUNTUThird Party Advisory