CVE-2019-19209

Current Description

Memory leaks in *clock_source_create() functions under drivers/gpu/drm/amd/display/dc in the Linux kernel before 5.3.8 allow attackers to cause a denial of service (memory consumption). This affects the dce112_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce112/dce112_resource.c, the dce100_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce100/dce100_resource.c, the dcn10_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dcn10/dcn10_resource.c, the dcn20_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dcn20/dcn20_resource.c, the dce120_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce120/dce120_resource.c, the dce110_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce110/dce110_resource.c, and the dce80_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce80/dce80_resource.c, aka CID-055e547478a1.

Basic Data

PublishedNovember 18, 2019
Last ModifiedApril 17, 2020
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-400
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:L/AC:M/Au:N/C:N/I:N/A:C
CVSS 2 - Access VectorLOCAL
CVSS 2 - Access ComplexityMEDIUM
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactNONE
CVSS 2 - Availability ImpactCOMPLETE
CVSS 2 - Base Score4.7
SeverityMEDIUM
Exploitability Score3.4
Impact Score6.9
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSLinuxLinux Kernel********5.3.8
  • OR - Configuration 2
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSCanonicalUbuntu Linux14.04***esm***
    2.3OSCanonicalUbuntu Linux16.04***lts***
    2.3OSCanonicalUbuntu Linux18.04***lts***
    2.3OSCanonicalUbuntu Linux19.04*******
    2.3OSCanonicalUbuntu Linux19.10*******
    2.3OSOpensuseLeap15.1*******

Vulnerable Software List

VendorProductVersions
Canonical Ubuntu Linux 14.04, 16.04, 18.04, 19.04, 19.10
Opensuse Leap 15.1
Linux Linux Kernel *

References

NameSourceURLTags
openSUSE-SU-2019:2675http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.htmlSUSEThird Party Advisory
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.8https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.8MISCRelease Notes Vendor Advisory
https://github.com/torvalds/linux/commit/055e547478a11a6360c7ce05e2afc3e366968a12https://github.com/torvalds/linux/commit/055e547478a11a6360c7ce05e2afc3e366968a12MISCPatch Third Party Advisory
https://security.netapp.com/advisory/ntap-20191205-0001/https://security.netapp.com/advisory/ntap-20191205-0001/CONFIRMThird Party Advisory
USN-4208-1https://usn.ubuntu.com/4208-1/UBUNTUThird Party Advisory
USN-4226-1https://usn.ubuntu.com/4226-1/UBUNTUThird Party Advisory
USN-4227-1https://usn.ubuntu.com/4227-1/UBUNTUThird Party Advisory
USN-4227-2https://usn.ubuntu.com/4227-2/UBUNTUThird Party Advisory