ID

VAR-201911-1397


CVE

CVE-2019-19044


TITLE

Linux Kernel Vulnerable to resource exhaustion

Trust: 0.8

sources: JVNDB: JVNDB-2019-011984

DESCRIPTION

Two memory leaks in the v3d_submit_cl_ioctl() function in drivers/gpu/drm/v3d/v3d_gem.c in the Linux kernel before 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering kcalloc() or v3d_job_init() failures, aka CID-29cd13cfd762. Linux Kernel Contains a resource exhaustion vulnerability. Vendors have confirmed this vulnerability CID-29cd13cfd762 It is released as.Service operation interruption (DoS) There is a possibility of being put into a state. ========================================================================= Ubuntu Security Notice USN-4225-1 January 07, 2020 linux, linux-aws, linux-azure, linux-azure-5.3, linux-gcp, linux-gcp-5.3, linux-kvm, linux-oracle, linux-raspi2 vulnerabilities ========================================================================= A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 19.10 - Ubuntu 18.04 LTS Summary: Several security issues were fixed in the Linux kernel. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-14895, CVE-2019-14901) It was discovered that a heap-based buffer overflow existed in the Marvell Libertas WLAN Driver for the Linux kernel. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-14896, CVE-2019-14897) It was discovered that the Fujitsu ES network device driver for the Linux kernel did not properly check for errors in some situations, leading to a NULL pointer dereference. A local attacker could use this to cause a denial of service. (CVE-2019-16231) Anthony Steinhauser discovered that the Linux kernel did not properly perform Spectre_RSB mitigations to all processors for PowerPC architecture systems in some situations. A local attacker could use this to expose sensitive information. (CVE-2019-18660) It was discovered that the Broadcom V3D DRI driver in the Linux kernel did not properly deallocate memory in certain error conditions. (CVE-2019-19044) It was discovered that the Mellanox Technologies Innova driver in the Linux kernel did not properly deallocate memory in certain failure conditions. (CVE-2019-19045) It was discovered that the Mellanox Technologies ConnectX driver in the Linux kernel did not properly deallocate memory in certain failure conditions. (CVE-2019-19047) It was discovered that the Intel WiMAX 2400 driver in the Linux kernel did not properly deallocate memory in certain situations. (CVE-2019-19051) It was discovered that Geschwister Schneider USB CAN interface driver in the Linux kernel did not properly deallocate memory in certain failure conditions. (CVE-2019-19052) It was discovered that the netlink-based 802.11 configuration interface in the Linux kernel did not deallocate memory in certain error conditions. (CVE-2019-19055) It was discovered that the event tracing subsystem of the Linux kernel did not properly deallocate memory in certain error conditions. A physically proximate attacker could possibly use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2019-19524) It was discovered that the Microchip CAN BUS Analyzer driver in the Linux kernel contained a use-after-free vulnerability on device disconnect. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-19529) It was discovered that the PEAK-System Technik USB driver in the Linux kernel did not properly sanitize memory before sending it to the device. A physically proximate attacker could use this to expose sensitive information (kernel memory). A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-19807) It was discovered that the DesignWare USB3 controller driver in the Linux kernel did not properly deallocate memory in some error conditions. (CVE-2019-18813) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 19.10: linux-image-5.3.0-1008-oracle 5.3.0-1008.9 linux-image-5.3.0-1009-aws 5.3.0-1009.10 linux-image-5.3.0-1009-azure 5.3.0-1009.10 linux-image-5.3.0-1009-kvm 5.3.0-1009.10 linux-image-5.3.0-1011-gcp 5.3.0-1011.12 linux-image-5.3.0-1015-raspi2 5.3.0-1015.17 linux-image-5.3.0-26-generic 5.3.0-26.28 linux-image-5.3.0-26-generic-lpae 5.3.0-26.28 linux-image-5.3.0-26-lowlatency 5.3.0-26.28 linux-image-5.3.0-26-snapdragon 5.3.0-26.28 linux-image-aws 5.3.0.1009.11 linux-image-azure 5.3.0.1009.27 linux-image-gcp 5.3.0.1011.12 linux-image-generic 5.3.0.26.30 linux-image-generic-lpae 5.3.0.26.30 linux-image-gke 5.3.0.1011.12 linux-image-kvm 5.3.0.1009.11 linux-image-lowlatency 5.3.0.26.30 linux-image-oracle 5.3.0.1008.9 linux-image-raspi2 5.3.0.1015.12 linux-image-snapdragon 5.3.0.26.30 linux-image-virtual 5.3.0.26.30 Ubuntu 18.04 LTS: linux-image-5.3.0-1009-azure 5.3.0-1009.10~18.04.1 linux-image-5.3.0-1010-gcp 5.3.0-1010.11~18.04.1 linux-image-azure-edge 5.3.0.1009.9 linux-image-gcp-edge 5.3.0.1010.10 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References: https://usn.ubuntu.com/4225-1 CVE-2019-14895, CVE-2019-14896, CVE-2019-14897, CVE-2019-14901, CVE-2019-16231, CVE-2019-18660, CVE-2019-18813, CVE-2019-19044, CVE-2019-19045, CVE-2019-19047, CVE-2019-19051, CVE-2019-19052, CVE-2019-19055, CVE-2019-19072, CVE-2019-19524, CVE-2019-19529, CVE-2019-19534, CVE-2019-19807 Package Information: https://launchpad.net/ubuntu/+source/linux/5.3.0-26.28 https://launchpad.net/ubuntu/+source/linux-aws/5.3.0-1009.10 https://launchpad.net/ubuntu/+source/linux-azure/5.3.0-1009.10 https://launchpad.net/ubuntu/+source/linux-gcp/5.3.0-1011.12 https://launchpad.net/ubuntu/+source/linux-kvm/5.3.0-1009.10 https://launchpad.net/ubuntu/+source/linux-oracle/5.3.0-1008.9 https://launchpad.net/ubuntu/+source/linux-raspi2/5.3.0-1015.17 https://launchpad.net/ubuntu/+source/linux-azure-5.3/5.3.0-1009.10~18.04.1 https://launchpad.net/ubuntu/+source/linux-gcp-5.3/5.3.0-1010.11~18.04.1

Trust: 1.8

sources: NVD: CVE-2019-19044 // JVNDB: JVNDB-2019-011984 // VULHUB: VHN-151451 // PACKETSTORM: 155853

AFFECTED PRODUCTS

vendor:linuxmodel:kernelscope:ltversion:5.3.11

Trust: 1.8

vendor:netappmodel:e-series santricity os controllerscope:eqversion:11.60.0

Trust: 1.0

vendor:netappmodel:e-series santricity os controllerscope:eqversion:11.25

Trust: 1.0

vendor:netappmodel:solidfire\, enterprise sds \& hci storage nodescope:eqversion: -

Trust: 1.0

vendor:netappmodel:data availability servicesscope:eqversion: -

Trust: 1.0

vendor:netappmodel:e-series santricity os controllerscope:eqversion:11.30

Trust: 1.0

vendor:netappmodel:e-series santricity os controllerscope:eqversion:11.30.5r3

Trust: 1.0

vendor:netappmodel:solidfire \& hci management nodescope:eqversion: -

Trust: 1.0

vendor:netappmodel:steelstore cloud integrated storagescope:eqversion: -

Trust: 1.0

vendor:netappmodel:hci compute nodescope:eqversion: -

Trust: 1.0

vendor:netappmodel:e-series santricity os controllerscope:eqversion:11.20

Trust: 1.0

vendor:netappmodel:hci baseboard management controllerscope:eqversion:h610s

Trust: 1.0

vendor:netappmodel:e-series santricity os controllerscope:eqversion:11.60

Trust: 1.0

vendor:netappmodel:e-series santricity os controllerscope:eqversion:11.40.5

Trust: 1.0

vendor:netappmodel:aff baseboard management controllerscope:eqversion: -

Trust: 1.0

vendor:netappmodel:e-series santricity os controllerscope:eqversion:11.40

Trust: 1.0

vendor:netappmodel:e-series santricity os controllerscope:eqversion:11.40.3r2

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:19.10

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:18.04

Trust: 1.0

vendor:netappmodel:e-series santricity os controllerscope:eqversion:11.70.1

Trust: 1.0

vendor:netappmodel:e-series santricity os controllerscope:eqversion:11.0.0

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:5.3

Trust: 1.0

vendor:netappmodel:e-series santricity os controllerscope:eqversion:11.70.2

Trust: 1.0

vendor:netappmodel:cloud backupscope:eqversion: -

Trust: 1.0

vendor:netappmodel:e-series santricity os controllerscope:eqversion:11.50.1

Trust: 1.0

vendor:netappmodel:e-series santricity os controllerscope:eqversion:11.60.1

Trust: 1.0

vendor:netappmodel:active iq unified managerscope:eqversion: -

Trust: 1.0

vendor:netappmodel:e-series santricity os controllerscope:eqversion:11.0

Trust: 1.0

vendor:netappmodel:e-series santricity os controllerscope:eqversion:11.60.3

Trust: 1.0

vendor:netappmodel:solidfire baseboard management controllerscope:eqversion: -

Trust: 1.0

vendor:broadcommodel:brocade fabric operating systemscope:eqversion: -

Trust: 1.0

vendor:netappmodel:e-series santricity os controllerscope:eqversion:11.50.2

Trust: 1.0

vendor:netappmodel:fas\/aff baseboard management controllerscope:eqversion: -

Trust: 1.0

sources: JVNDB: JVNDB-2019-011984 // NVD: CVE-2019-19044

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-19044
value: HIGH

Trust: 1.0

NVD: CVE-2019-19044
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201911-1064
value: HIGH

Trust: 0.6

VULHUB: VHN-151451
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2019-19044
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-151451
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2019-19044
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2019-19044
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-151451 // JVNDB: JVNDB-2019-011984 // CNNVD: CNNVD-201911-1064 // NVD: CVE-2019-19044

PROBLEMTYPE DATA

problemtype:CWE-401

Trust: 1.1

problemtype:CWE-400

Trust: 0.8

sources: VULHUB: VHN-151451 // JVNDB: JVNDB-2019-011984 // NVD: CVE-2019-19044

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201911-1064

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201911-1064

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-011984

PATCH

title:ChangeLog-5.3.11url:https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.11

Trust: 0.8

title:drm/v3d: Fix memory leak in v3d_submit_cl_ioctlurl:https://github.com/torvalds/linux/commit/29cd13cfd7624726d9e6becbae9aa419ef35af7f

Trust: 0.8

title:Linux Kernel Archivesurl:http://www.kernel.org

Trust: 0.8

title:Linux kernel Remediation of resource management error vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=102986

Trust: 0.6

sources: JVNDB: JVNDB-2019-011984 // CNNVD: CNNVD-201911-1064

EXTERNAL IDS

db:NVDid:CVE-2019-19044

Trust: 2.6

db:JVNDBid:JVNDB-2019-011984

Trust: 0.8

db:CNNVDid:CNNVD-201911-1064

Trust: 0.7

db:PACKETSTORMid:155853

Trust: 0.7

db:AUSCERTid:ESB-2020.0052

Trust: 0.6

db:VULHUBid:VHN-151451

Trust: 0.1

sources: VULHUB: VHN-151451 // JVNDB: JVNDB-2019-011984 // PACKETSTORM: 155853 // CNNVD: CNNVD-201911-1064 // NVD: CVE-2019-19044

REFERENCES

url:https://security.netapp.com/advisory/ntap-20191205-0001/

Trust: 1.7

url:https://cdn.kernel.org/pub/linux/kernel/v5.x/changelog-5.3.11

Trust: 1.7

url:https://github.com/torvalds/linux/commit/29cd13cfd7624726d9e6becbae9aa419ef35af7f

Trust: 1.7

url:https://usn.ubuntu.com/4225-1/

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2019-19044

Trust: 1.5

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-19044

Trust: 0.8

url:https://usn.ubuntu.com/4228-1/

Trust: 0.6

url:https://usn.ubuntu.com/4227-1/

Trust: 0.6

url:https://usn.ubuntu.com/4226-1/

Trust: 0.6

url:https://vigilance.fr/vulnerability/linux-kernel-five-vulnerabilities-via-memory-leak-30910

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.0052/

Trust: 0.6

url:https://packetstormsecurity.com/files/155853/ubuntu-security-notice-usn-4225-1.html

Trust: 0.6

url:https://usn.ubuntu.com/4225-1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-16231

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-18813

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-18660

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-19052

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/5.3.0-1009.10

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp-5.3/5.3.0-1010.11~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure-5.3/5.3.0-1009.10~18.04.1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-19047

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-19045

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-14895

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-kvm/5.3.0-1009.10

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp/5.3.0-1011.12

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/5.3.0-26.28

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-19524

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-19807

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-19529

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-19072

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-raspi2/5.3.0-1015.17

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-19534

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-19055

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure/5.3.0-1009.10

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-19051

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle/5.3.0-1008.9

Trust: 0.1

sources: VULHUB: VHN-151451 // JVNDB: JVNDB-2019-011984 // PACKETSTORM: 155853 // CNNVD: CNNVD-201911-1064 // NVD: CVE-2019-19044

CREDITS

Ubuntu

Trust: 0.7

sources: PACKETSTORM: 155853 // CNNVD: CNNVD-201911-1064

SOURCES

db:VULHUBid:VHN-151451
db:JVNDBid:JVNDB-2019-011984
db:PACKETSTORMid:155853
db:CNNVDid:CNNVD-201911-1064
db:NVDid:CVE-2019-19044

LAST UPDATE DATE

2024-08-14T12:34:39.579000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-151451date:2023-01-20T00:00:00
db:JVNDBid:JVNDB-2019-011984date:2019-11-22T00:00:00
db:CNNVDid:CNNVD-201911-1064date:2020-08-25T00:00:00
db:NVDid:CVE-2019-19044date:2023-01-20T14:35:42.983

SOURCES RELEASE DATE

db:VULHUBid:VHN-151451date:2019-11-18T00:00:00
db:JVNDBid:JVNDB-2019-011984date:2019-11-22T00:00:00
db:PACKETSTORMid:155853date:2020-01-07T16:46:28
db:CNNVDid:CNNVD-201911-1064date:2019-11-18T00:00:00
db:NVDid:CVE-2019-19044date:2019-11-18T06:15:11.280