Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2019-19044 (GCVE-0-2019-19044)
Vulnerability from cvelistv5
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.11 | Release Notes, Vendor Advisory | |
cve@mitre.org | https://github.com/torvalds/linux/commit/29cd13cfd7624726d9e6becbae9aa419ef35af7f | Patch, Third Party Advisory | |
cve@mitre.org | https://security.netapp.com/advisory/ntap-20191205-0001/ | Third Party Advisory | |
cve@mitre.org | https://usn.ubuntu.com/4225-1/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.11 | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/torvalds/linux/commit/29cd13cfd7624726d9e6becbae9aa419ef35af7f | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20191205-0001/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/4225-1/ | Third Party Advisory |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T02:09:38.256Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.11", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/torvalds/linux/commit/29cd13cfd7624726d9e6becbae9aa419ef35af7f", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20191205-0001/", }, { name: "USN-4225-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4225-1/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "Two memory leaks in the v3d_submit_cl_ioctl() function in drivers/gpu/drm/v3d/v3d_gem.c in the Linux kernel before 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering kcalloc() or v3d_job_init() failures, aka CID-29cd13cfd762.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-01-07T05:06:54", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.11", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/torvalds/linux/commit/29cd13cfd7624726d9e6becbae9aa419ef35af7f", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20191205-0001/", }, { name: "USN-4225-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4225-1/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2019-19044", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Two memory leaks in the v3d_submit_cl_ioctl() function in drivers/gpu/drm/v3d/v3d_gem.c in the Linux kernel before 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering kcalloc() or v3d_job_init() failures, aka CID-29cd13cfd762.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.11", refsource: "MISC", url: "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.11", }, { name: "https://github.com/torvalds/linux/commit/29cd13cfd7624726d9e6becbae9aa419ef35af7f", refsource: "MISC", url: "https://github.com/torvalds/linux/commit/29cd13cfd7624726d9e6becbae9aa419ef35af7f", }, { name: "https://security.netapp.com/advisory/ntap-20191205-0001/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20191205-0001/", }, { name: "USN-4225-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4225-1/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2019-19044", datePublished: "2019-11-18T05:23:39", dateReserved: "2019-11-18T00:00:00", dateUpdated: "2024-08-05T02:09:38.256Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { fkie_nvd: { configurations: "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"5.3\", \"versionEndExcluding\": \"5.3.11\", \"matchCriteriaId\": \"5DE0A98B-691B-452B-8586-6A95E92C4C98\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*\", \"matchCriteriaId\": \"3A756737-1CC4-42C2-A4DF-E1C893B4E2D5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:aff_baseboard_management_controller:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C0ADE5D-F91D-4E0D-B6C5-3511B19665F1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C2089EE-5D7F-47EC-8EA5-0F69790564C4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:data_availability_services:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0EF46487-B64A-454E-AECC-D74B83170ACD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8AFF1109-26F3-43A5-A4CB-0F169FDBC0DE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5AF71C49-ADEF-4EE2-802C-6159ADD51355\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B3BC6E59-2134-4A28-AAD2-77C8AE236BCF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.25:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"24377899-5389-4BDC-AC82-0E4186F4DE53\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"23FE83DE-AE7C-4313-88E3-886110C31302\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.30.5r3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"490B327B-AC20-419B-BB76-8AB6971304BB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.40:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8DCE2754-7A9E-4B3B-91D1-DCF90C1BABE5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.40.3r2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6CA74E8B-51E2-4A7C-8A98-0583D31134A6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.40.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7B64AB37-A1D9-4163-A51B-4C780361F1F1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.50.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7BE9C9D7-9CED-4184-A190-1024A6FB8C82\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.50.2:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"B73D4C3C-A511-4E14-B19F-91F561ACB1B8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.50.2:p1:*:*:*:*:*:*\", \"matchCriteriaId\": \"0C47D72C-9B6B-4E52-AF0E-56AD58E4A930\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.60:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"039C3790-5AA2-4895-AEAE-CC84A71DB907\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.60.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B4592238-D1F2-43D6-9BAB-2F63ECF9C965\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.60.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0BA78068-80E9-4E49-9056-88EAB7E3682C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.60.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"092F366C-E8B0-4BE5-B106-0B7A73B08D34\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.70.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E7992E92-B159-4810-B895-01A9B944058A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.70.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5BDD7AAB-2BF3-4E8C-BEE2-5217E2926C11\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:fas\\\\/aff_baseboard_management_controller:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"66EEA3CA-8CC7-4F0B-8204-6132D4114873\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:hci_baseboard_management_controller:h610s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DE7C6010-F736-4BDA-9E3B-C4370BBFA149\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:solidfire\\\\,_enterprise_sds_\\\\&_hci_storage_node:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DAA3919C-B2B1-4CB5-BA76-7A079AAFFC52\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:solidfire_\\\\&_hci_management_node:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D6D700C5-F67F-4FFB-BE69-D524592A3D2E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E94F7F59-1785-493F-91A7-5F5EA5E87E4D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:broadcom:brocade_fabric_operating_system_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B2748912-FC54-47F6-8C0C-B96784765B8E\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netapp:hci_compute_node_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F921BC85-568E-4B69-A3CD-CF75C76672F1\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AD7447BC-F315-4298-A822-549942FC118B\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netapp:solidfire_baseboard_management_controller_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FB9B8171-F6CA-427D-81E0-6536D3BBFA8D\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netapp:solidfire_baseboard_management_controller:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"090AA6F4-4404-4E26-82AB-C3A22636F276\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*\", \"matchCriteriaId\": \"23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A31C8344-3E02-4EB8-8BD8-4C84B7959624\"}]}]}]", descriptions: "[{\"lang\": \"en\", \"value\": \"Two memory leaks in the v3d_submit_cl_ioctl() function in drivers/gpu/drm/v3d/v3d_gem.c in the Linux kernel before 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering kcalloc() or v3d_job_init() failures, aka CID-29cd13cfd762.\"}, {\"lang\": \"es\", \"value\": \"Dos p\\u00e9rdidas de memoria en la funci\\u00f3n v3d_submit_cl_ioctl() en el archivo drivers/gpu/drm/v3d/v3d_gem.c en el kernel de Linux versiones anteriores a la versi\\u00f3n 5.3.11, permiten a atacantes causar una denegaci\\u00f3n de servicio (consumo de memoria) al desencadenar fallos de la funci\\u00f3n kcalloc() o v3d_job_init(), tambi\\u00e9n se conoce como CID-29cd13cfd762.\"}]", id: "CVE-2019-19044", lastModified: "2024-11-21T04:34:03.447", metrics: "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:N/A:C\", \"baseScore\": 7.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 6.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", published: "2019-11-18T06:15:11.280", references: "[{\"url\": \"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.11\", \"source\": \"cve@mitre.org\", \"tags\": [\"Release Notes\", \"Vendor Advisory\"]}, {\"url\": \"https://github.com/torvalds/linux/commit/29cd13cfd7624726d9e6becbae9aa419ef35af7f\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20191205-0001/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/4225-1/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.11\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Release Notes\", \"Vendor Advisory\"]}, {\"url\": \"https://github.com/torvalds/linux/commit/29cd13cfd7624726d9e6becbae9aa419ef35af7f\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20191205-0001/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/4225-1/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]", sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-401\"}]}]", }, nvd: "{\"cve\":{\"id\":\"CVE-2019-19044\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2019-11-18T06:15:11.280\",\"lastModified\":\"2024-11-21T04:34:03.447\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Two memory leaks in the v3d_submit_cl_ioctl() function in drivers/gpu/drm/v3d/v3d_gem.c in the Linux kernel before 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering kcalloc() or v3d_job_init() failures, aka CID-29cd13cfd762.\"},{\"lang\":\"es\",\"value\":\"Dos pérdidas de memoria en la función v3d_submit_cl_ioctl() en el archivo drivers/gpu/drm/v3d/v3d_gem.c en el kernel de Linux versiones anteriores a la versión 5.3.11, permiten a atacantes causar una denegación de servicio (consumo de memoria) al desencadenar fallos de la función kcalloc() o v3d_job_init(), también se conoce como CID-29cd13cfd762.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":7.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-401\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.3\",\"versionEndExcluding\":\"5.3.11\",\"matchCriteriaId\":\"5DE0A98B-691B-452B-8586-6A95E92C4C98\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*\",\"matchCriteriaId\":\"3A756737-1CC4-42C2-A4DF-E1C893B4E2D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:aff_baseboard_management_controller:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C0ADE5D-F91D-4E0D-B6C5-3511B19665F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C2089EE-5D7F-47EC-8EA5-0F69790564C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:data_availability_services:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EF46487-B64A-454E-AECC-D74B83170ACD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AFF1109-26F3-43A5-A4CB-0F169FDBC0DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AF71C49-ADEF-4EE2-802C-6159ADD51355\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3BC6E59-2134-4A28-AAD2-77C8AE236BCF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24377899-5389-4BDC-AC82-0E4186F4DE53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23FE83DE-AE7C-4313-88E3-886110C31302\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.30.5r3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"490B327B-AC20-419B-BB76-8AB6971304BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DCE2754-7A9E-4B3B-91D1-DCF90C1BABE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.40.3r2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CA74E8B-51E2-4A7C-8A98-0583D31134A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.40.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B64AB37-A1D9-4163-A51B-4C780361F1F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.50.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BE9C9D7-9CED-4184-A190-1024A6FB8C82\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.50.2:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"B73D4C3C-A511-4E14-B19F-91F561ACB1B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.50.2:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C47D72C-9B6B-4E52-AF0E-56AD58E4A930\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.60:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"039C3790-5AA2-4895-AEAE-CC84A71DB907\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.60.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4592238-D1F2-43D6-9BAB-2F63ECF9C965\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.60.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0BA78068-80E9-4E49-9056-88EAB7E3682C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.60.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"092F366C-E8B0-4BE5-B106-0B7A73B08D34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.70.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7992E92-B159-4810-B895-01A9B944058A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.70.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BDD7AAB-2BF3-4E8C-BEE2-5217E2926C11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:fas\\\\/aff_baseboard_management_controller:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66EEA3CA-8CC7-4F0B-8204-6132D4114873\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:hci_baseboard_management_controller:h610s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE7C6010-F736-4BDA-9E3B-C4370BBFA149\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:solidfire\\\\,_enterprise_sds_\\\\&_hci_storage_node:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAA3919C-B2B1-4CB5-BA76-7A079AAFFC52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:solidfire_\\\\&_hci_management_node:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6D700C5-F67F-4FFB-BE69-D524592A3D2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E94F7F59-1785-493F-91A7-5F5EA5E87E4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:broadcom:brocade_fabric_operating_system_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2748912-FC54-47F6-8C0C-B96784765B8E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:hci_compute_node_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F921BC85-568E-4B69-A3CD-CF75C76672F1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD7447BC-F315-4298-A822-549942FC118B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:solidfire_baseboard_management_controller_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB9B8171-F6CA-427D-81E0-6536D3BBFA8D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:solidfire_baseboard_management_controller:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"090AA6F4-4404-4E26-82AB-C3A22636F276\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A31C8344-3E02-4EB8-8BD8-4C84B7959624\"}]}]}],\"references\":[{\"url\":\"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.11\",\"source\":\"cve@mitre.org\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/torvalds/linux/commit/29cd13cfd7624726d9e6becbae9aa419ef35af7f\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20191205-0001/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4225-1/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.11\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/torvalds/linux/commit/29cd13cfd7624726d9e6becbae9aa419ef35af7f\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20191205-0001/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4225-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}", }, }
gsd-2019-19044
Vulnerability from gsd
{ GSD: { alias: "CVE-2019-19044", description: "Two memory leaks in the v3d_submit_cl_ioctl() function in drivers/gpu/drm/v3d/v3d_gem.c in the Linux kernel before 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering kcalloc() or v3d_job_init() failures, aka CID-29cd13cfd762.", id: "GSD-2019-19044", references: [ "https://www.suse.com/security/cve/CVE-2019-19044.html", "https://ubuntu.com/security/CVE-2019-19044", ], }, gsd: { metadata: { exploitCode: "unknown", remediation: "unknown", reportConfidence: "confirmed", type: "vulnerability", }, osvSchema: { aliases: [ "CVE-2019-19044", ], details: "Two memory leaks in the v3d_submit_cl_ioctl() function in drivers/gpu/drm/v3d/v3d_gem.c in the Linux kernel before 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering kcalloc() or v3d_job_init() failures, aka CID-29cd13cfd762.", id: "GSD-2019-19044", modified: "2023-12-13T01:23:54.666139Z", schema_version: "1.4.0", }, }, namespaces: { "cve.org": { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2019-19044", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Two memory leaks in the v3d_submit_cl_ioctl() function in drivers/gpu/drm/v3d/v3d_gem.c in the Linux kernel before 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering kcalloc() or v3d_job_init() failures, aka CID-29cd13cfd762.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.11", refsource: "MISC", url: "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.11", }, { name: "https://github.com/torvalds/linux/commit/29cd13cfd7624726d9e6becbae9aa419ef35af7f", refsource: "MISC", url: "https://github.com/torvalds/linux/commit/29cd13cfd7624726d9e6becbae9aa419ef35af7f", }, { name: "https://security.netapp.com/advisory/ntap-20191205-0001/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20191205-0001/", }, { name: "USN-4225-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4225-1/", }, ], }, }, "nvd.nist.gov": { configurations: { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "5.3.11", versionStartIncluding: "5.3", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:aff_baseboard_management_controller:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:data_availability_services:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:solidfire_\\&_hci_management_node:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:solidfire\\,_enterprise_sds_\\&_hci_storage_node:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:broadcom:brocade_fabric_operating_system_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:fas\\/aff_baseboard_management_controller:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.0.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.25:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.30.5r3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.40:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.40.3r2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.40.5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.50.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.50.2:-:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.50.2:p1:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.60:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.60.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.60.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.60.3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.70.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.70.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:hci_baseboard_management_controller:h610s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netapp:hci_compute_node_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netapp:solidfire_baseboard_management_controller_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netapp:solidfire_baseboard_management_controller:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, ], }, cve: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2019-19044", }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "en", value: "Two memory leaks in the v3d_submit_cl_ioctl() function in drivers/gpu/drm/v3d/v3d_gem.c in the Linux kernel before 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering kcalloc() or v3d_job_init() failures, aka CID-29cd13cfd762.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "en", value: "CWE-401", }, ], }, ], }, references: { reference_data: [ { name: "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.11", refsource: "MISC", tags: [ "Release Notes", "Vendor Advisory", ], url: "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.11", }, { name: "https://github.com/torvalds/linux/commit/29cd13cfd7624726d9e6becbae9aa419ef35af7f", refsource: "MISC", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/torvalds/linux/commit/29cd13cfd7624726d9e6becbae9aa419ef35af7f", }, { name: "https://security.netapp.com/advisory/ntap-20191205-0001/", refsource: "CONFIRM", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20191205-0001/", }, { name: "USN-4225-1", refsource: "UBUNTU", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/4225-1/", }, ], }, }, impact: { baseMetricV2: { acInsufInfo: false, cvssV2: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.8, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "HIGH", userInteractionRequired: false, }, baseMetricV3: { cvssV3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, }, }, lastModifiedDate: "2023-01-20T14:35Z", publishedDate: "2019-11-18T06:15Z", }, }, }
wid-sec-w-2023-0198
Vulnerability from csaf_certbund
Notes
{ document: { aggregate_severity: { text: "mittel", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Der Kernel stellt den Kern des Linux Betriebssystems dar.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuführen.", title: "Angriff", }, { category: "general", text: "- Linux", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2023-0198 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2019/wid-sec-w-2023-0198.json", }, { category: "self", summary: "WID-SEC-2023-0198 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0198", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:0152-1 vom 2023-01-26", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-January/013530.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:0134-1 vom 2023-01-25", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-January/013523.html", }, { category: "external", summary: "Ubuntu Security Notice USN-4226-1 vom 2020-01-07", url: "https://usn.ubuntu.com/4226-1/", }, { category: "external", summary: "Ubuntu Security Notice USN-4227-1 vom 2020-01-07", url: "https://usn.ubuntu.com/4227-1/", }, { category: "external", summary: "Ubuntu Security Notice USN-4228-1 vom 2020-01-07", url: "https://usn.ubuntu.com/4228-1/", }, { category: "external", summary: "Ubuntu Security Notice USN-4225-1 vom 2020-01-07", url: "https://usn.ubuntu.com/4225-1/", }, { category: "external", summary: "Ubuntu Security Notice USN-4225-2 vom 2020-01-18", url: "https://packetstormsecurity.com/files/155995/USN-4225-2.txt", }, { category: "external", summary: "Ubuntu Security Notice USN-4254-1 vom 2020-01-28", url: "https://usn.ubuntu.com/4254-1/", }, { category: "external", summary: "Ubuntu Security Notice USN-4228-2 vom 2020-01-07", url: "https://usn.ubuntu.com/4228-2/", }, { category: "external", summary: "Ubuntu Security Notice USN-4227-2 vom 2020-01-07", url: "https://usn.ubuntu.com/4227-2/", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:0093-1 vom 2020-01-14", url: "https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19043", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19044", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19045", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19046", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19047", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19048", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19049", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19050", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19051", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19052", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19053", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19054", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19055", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19056", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19057", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19058", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19059", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19060", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19061", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19062", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19063", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19064", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19065", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19066", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19067", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19068", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19069", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19070", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19071", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19072", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19073", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19074", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19075", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19076", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19077", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19078", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19079", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19080", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19081", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19082", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19083", }, { category: "external", summary: "Ubuntu Security Notice USN-4209-1 vom 2019-12-03", url: "https://usn.ubuntu.com/4209-1/", }, { category: "external", summary: "Ubuntu Security Notice USN-4208-1 vom 2019-12-03", url: "https://usn.ubuntu.com/4208-1/", }, { category: "external", summary: "Ubuntu Security Notice USN-4210-1 vom 2019-12-03", url: "https://usn.ubuntu.com/4210-1/", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2019:3200-1 vom 2019-12-07", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193200-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2019:3289-1 vom 2019-12-13", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193289-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2019:3316-1 vom 2019-12-18", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193316-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2019:3317-1 vom 2019-12-18", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193317-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2019:3371-1 vom 2019-12-20", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193371-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2019:3379-1 vom 2019-12-21", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193379-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2019:3372-1 vom 2019-12-20", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2019:3381-1 vom 2019-12-23", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193381-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2019:3389-1 vom 2019-12-28", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193389-1.html", }, { category: "external", summary: "Ubuntu Security Notice USN-4258-1 vom 2020-01-29", url: "https://usn.ubuntu.com/4258-1/", }, { category: "external", summary: "Ubuntu Security Notice USN-4254-2 vom 2020-01-29", url: "https://usn.ubuntu.com/4254-2/", }, { category: "external", summary: "Ubuntu Security Notice USN-4284-1 vom 2020-02-18", url: "https://usn.ubuntu.com/4284-1/", }, { category: "external", summary: "Ubuntu Security Notice USN-4287-1 vom 2020-02-18", url: "https://usn.ubuntu.com/4287-2/", }, { category: "external", summary: "Ubuntu Security Notice USN-4286-1 vom 2020-02-18", url: "https://usn.ubuntu.com/4286-2/", }, { category: "external", summary: "Ubuntu Security Notice USN-4285-1 vom 2020-02-18", url: "https://usn.ubuntu.com/4285-1/", }, { category: "external", summary: "EMC Security Advisory DSA-2020-053 vom 2020-02-27", url: "https://www.dell.com/support/security/de-de/details/DOC-111088/DSA-2020-053-RSA&", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:0511-1 vom 2020-02-28", url: "https://www.suse.com/support/update/announcement/2020/suse-su-20200511-1.html", }, { category: "external", summary: "Debian Security Advisory DLA 2068 vom 2020-03-02", url: "https://lists.debian.org/debian-lts-announce/2020/debian-lts-announce-202001/msg00013.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:0560-1 vom 2020-03-03", url: "https://www.suse.com/support/update/announcement/2020/suse-su-20200560-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:0559-1 vom 2020-03-02", url: "https://www.suse.com/support/update/announcement/2020/suse-su-20200559-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:0558-1 vom 2020-03-02", url: "https://www.suse.com/support/update/announcement/2020/suse-su-20200558-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:0580-1 vom 2020-03-04", url: "https://www.suse.com/support/update/announcement/2020/suse-su-20200580-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:0584-1 vom 2020-03-04", url: "https://www.suse.com/support/update/announcement/2020/suse-su-20200584-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:0599-1 vom 2020-03-06", url: "https://www.suse.com/support/update/announcement/2020/suse-su-20200599-1.html", }, { category: "external", summary: "Debian Security Advisory DLA 2131 vom 2020-03-05", url: "https://lists.debian.org/debian-lts-announce/2020/debian-lts-announce-202003/msg00001.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:0605-1 vom 2020-03-06", url: "https://www.suse.com/support/update/announcement/2020/suse-su-20200605-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:0613-1 vom 2020-03-10", url: "https://www.suse.com/support/update/announcement/2020/suse-su-20200613-1.html", }, { category: "external", summary: "Ubuntu Security Notice USN-4300-1 vom 2020-03-17", url: "https://usn.ubuntu.com/4300-1/", }, { category: "external", summary: "Ubuntu Security Notice USN-4302-1 vom 2020-03-17", url: "https://usn.ubuntu.com/4302-1/", }, { category: "external", summary: "Ubuntu Security Notice USN-4319-1 vom 2020-04-06", url: "https://usn.ubuntu.com/4319-1/", }, { category: "external", summary: "Ubuntu Security Notice USN-4325-1 vom 2020-04-08", url: "https://usn.ubuntu.com/4325-1/", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:1769 vom 2020-04-28", url: "https://access.redhat.com/errata/RHSA-2020:1769", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:1567 vom 2020-04-28", url: "https://access.redhat.com/errata/RHSA-2020:1567", }, { category: "external", summary: "Ubuntu Security Notice USN-4344-1 vom 2020-04-29", url: "https://usn.ubuntu.com/4344-1/", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:14354-1 vom 2020-05-01", url: "https://www.suse.com/support/update/announcement/2020/suse-su-202014354-1.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2020-5670 vom 2020-05-07", url: "https://oss.oracle.com/pipermail/el-errata/2020-May/009889.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2020-5670 vom 2020-05-07", url: "https://oss.oracle.com/pipermail/el-errata/2020-May/009888.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2020-1769 vom 2020-05-13", url: "https://oss.oracle.com/pipermail/el-errata/2020-May/009919.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:1255-1 vom 2020-05-15", url: "https://www.suse.com/support/update/announcement/2020/suse-su-20201255-1.html", }, { category: "external", summary: "Ubuntu Security Notice USN-4364-1 vom 2020-05-19", url: "https://usn.ubuntu.com/4364-1/", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:1275-1 vom 2020-05-21", url: "https://www.suse.com/support/update/announcement/2020/suse-su-20201275-1.html", }, { category: "external", summary: "ORACLE OVMSA-2020-0019 vom 2020-06-04", url: "https://oss.oracle.com/pipermail/oraclevm-errata/2020-June/000980.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2020-5708 vom 2020-06-04", url: "https://oss.oracle.com/pipermail/el-errata/2020-June/009990.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2020-5708 vom 2020-06-04", url: "https://oss.oracle.com/pipermail/el-errata/2020-June/009989.html", }, { category: "external", summary: "ORACLE OVMSA-2020-0020 vom 2020-06-06", url: "https://oss.oracle.com/pipermail/oraclevm-errata/2020-June/000983.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:1663-1 vom 2020-06-18", url: "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:2854 vom 2020-07-07", url: "https://access.redhat.com/errata/RHSA-2020:2854", }, { category: "external", summary: "ORACLE OVMSA-2020-0032 vom 2020-08-08", url: "https://oss.oracle.com/pipermail/oraclevm-errata/2020-August/000992.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:3545 vom 2020-08-25", url: "https://access.redhat.com/errata/RHSA-2020:3545", }, { category: "external", summary: "ORACLE OVMSA-2020-0041 vom 2020-09-04", url: "https://oss.oracle.com/pipermail/oraclevm-errata/2020-September/000999.html", }, { category: "external", summary: "Ubuntu Security Notice USN-4526-1 vom 2020-09-22", url: "https://usn.ubuntu.com/4526-1/", }, { category: "external", summary: "Ubuntu Security Notice USN-4526-1 vom 2020-09-22", url: "https://ubuntu.com/security/notices/USN-4526-1", }, { category: "external", summary: "Ubuntu Security Notice USN-4525-1 vom 2020-09-22", url: "https://usn.ubuntu.com/4525-1/", }, { category: "external", summary: "Ubuntu Security Notice USN-4527-1 vom 2020-09-22", url: "https://usn.ubuntu.com/4527-1/", }, { category: "external", summary: "Ubuntu Security Notice USN-4904-1 vom 2021-04-14", url: "https://ubuntu.com/security/notices/USN-4904-1", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:4062 vom 2020-09-29", url: "https://access.redhat.com/errata/RHSA-2020:4062", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:4060 vom 2020-09-29", url: "https://access.redhat.com/errata/RHSA-2020:4060", }, { category: "external", summary: "ORACLE OVMSA-2020-0044 vom 2020-10-09", url: "https://oss.oracle.com/pipermail/oraclevm-errata/2020-October/001000.html", }, { category: "external", summary: "AVAYA Security Advisory ASA-2020-140 vom 2020-10-14", url: "https://downloads.avaya.com/css/P8/documents/101071393", }, { category: "external", summary: "Debian Security Advisory DLA-2420 vom 2020-10-30", url: "https://lists.debian.org/debian-lts-announce/2020/debian-lts-announce-202010/msg00032.html", }, { category: "external", summary: "Debian Security Advisory DLA-2420 vom 2020-10-31", url: "https://lists.debian.org/debian-lts-announce/2020/debian-lts-announce-202010/msg00034.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:4431 vom 2020-11-04", url: "https://access.redhat.com/errata/RHSA-2020:4431", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:4609 vom 2020-11-04", url: "https://access.redhat.com/errata/RHSA-2020:4609", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:5206 vom 2020-11-24", url: "https://access.redhat.com/errata/RHSA-2020:5206", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:3503-1 vom 2020-11-24", url: "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html", }, { category: "external", summary: "Amazon Linux Security Advisory ALAS-2021-1627 vom 2021-04-22", url: "https://alas.aws.amazon.com/AL2/ALAS-2021-1627.html", }, { category: "external", summary: "AVAYA Security Advisory ASA-2020-155 vom 2020-12-08", url: "https://downloads.avaya.com/css/P8/documents/101072832", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:5656 vom 2020-12-22", url: "https://access.redhat.com/errata/RHSA-2020:5656", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2021:0437-1 vom 2021-02-11", url: "https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2021-9473 vom 2021-10-08", url: "http://linux.oracle.com/errata/ELSA-2021-9473.html", }, { category: "external", summary: "ORACLE OVMSA-2021-0035 vom 2021-10-12", url: "https://oss.oracle.com/pipermail/oraclevm-errata/2021-October/001033.html", }, { category: "external", summary: "Amazon Linux Security Advisory ALASKERNEL-5.4-2022-014 vom 2022-01-31", url: "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2022-014.html", }, ], source_lang: "en-US", title: "Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service", tracking: { current_release_date: "2023-01-26T23:00:00.000+00:00", generator: { date: "2024-08-15T17:42:18.159+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2023-0198", initial_release_date: "2019-11-17T23:00:00.000+00:00", revision_history: [ { date: "2019-11-17T23:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2019-11-24T23:00:00.000+00:00", number: "2", summary: "Referenz(en) aufgenommen: FEDORA-2019-34A75D7E61, FEDORA-2019-021C968423", }, { date: "2019-11-26T23:00:00.000+00:00", number: "3", summary: "Referenz(en) aufgenommen: FEDORA-2019-8846A1A5A2, FEDORA-2019-91F6E7BB71", }, { date: "2019-12-02T23:00:00.000+00:00", number: "4", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2019-12-08T23:00:00.000+00:00", number: "5", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2019-12-12T23:00:00.000+00:00", number: "6", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2019-12-17T23:00:00.000+00:00", number: "7", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2019-12-22T23:00:00.000+00:00", number: "8", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2019-12-23T23:00:00.000+00:00", number: "9", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2019-12-29T23:00:00.000+00:00", number: "10", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2020-01-06T23:00:00.000+00:00", number: "11", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2020-01-07T23:00:00.000+00:00", number: "12", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2020-01-14T23:00:00.000+00:00", number: "13", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2020-01-19T23:00:00.000+00:00", number: "14", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2020-01-27T23:00:00.000+00:00", number: "15", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2020-01-28T23:00:00.000+00:00", number: "16", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2020-02-18T23:00:00.000+00:00", number: "17", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2020-02-26T23:00:00.000+00:00", number: "18", summary: "Neue Updates von EMC aufgenommen", }, { date: "2020-02-27T23:00:00.000+00:00", number: "19", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2020-03-02T23:00:00.000+00:00", number: "20", summary: "Neue Updates von Debian und SUSE aufgenommen", }, { date: "2020-03-04T23:00:00.000+00:00", number: "21", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2020-03-05T23:00:00.000+00:00", number: "22", summary: "Neue Updates von SUSE und Debian aufgenommen", }, { date: "2020-03-08T23:00:00.000+00:00", number: "23", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2020-03-09T23:00:00.000+00:00", number: "24", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2020-03-16T23:00:00.000+00:00", number: "25", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2020-04-06T22:00:00.000+00:00", number: "26", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2020-04-07T22:00:00.000+00:00", number: "27", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2020-04-28T22:00:00.000+00:00", number: "28", summary: "Neue Updates von Red Hat und Ubuntu aufgenommen", }, { date: "2020-05-03T22:00:00.000+00:00", number: "29", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2020-05-06T22:00:00.000+00:00", number: "30", summary: "Neue Updates von Oracle Linux aufgenommen", }, { date: "2020-05-13T22:00:00.000+00:00", number: "31", summary: "Neue Updates von Oracle Linux aufgenommen", }, { date: "2020-05-14T22:00:00.000+00:00", number: "32", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2020-05-18T22:00:00.000+00:00", number: "33", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2020-05-21T22:00:00.000+00:00", number: "34", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2020-06-03T22:00:00.000+00:00", number: "35", summary: "Neue Updates von ORACLE aufgenommen", }, { date: "2020-06-04T22:00:00.000+00:00", number: "36", summary: "Neue Updates von Oracle Linux aufgenommen", }, { date: "2020-06-07T22:00:00.000+00:00", number: "37", summary: "Neue Updates von ORACLE aufgenommen", }, { date: "2020-06-18T22:00:00.000+00:00", number: "38", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2020-07-07T22:00:00.000+00:00", number: "39", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2020-08-09T22:00:00.000+00:00", number: "40", summary: "Neue Updates von ORACLE aufgenommen", }, { date: "2020-08-25T22:00:00.000+00:00", number: "41", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2020-09-06T22:00:00.000+00:00", number: "42", summary: "Neue Updates von ORACLE aufgenommen", }, { date: "2020-09-21T22:00:00.000+00:00", number: "43", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2020-09-29T22:00:00.000+00:00", number: "44", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2020-10-11T22:00:00.000+00:00", number: "45", summary: "Neue Updates von ORACLE aufgenommen", }, { date: "2020-10-13T22:00:00.000+00:00", number: "46", summary: "Neue Updates von AVAYA aufgenommen", }, { date: "2020-11-01T23:00:00.000+00:00", number: "47", summary: "Neue Updates von Debian aufgenommen", }, { date: "2020-11-03T23:00:00.000+00:00", number: "48", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2020-11-23T23:00:00.000+00:00", number: "49", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2020-11-24T23:00:00.000+00:00", number: "50", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2020-12-09T23:00:00.000+00:00", number: "51", summary: "Neue Updates von AVAYA aufgenommen", }, { date: "2020-12-21T23:00:00.000+00:00", number: "52", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2021-02-11T23:00:00.000+00:00", number: "53", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2021-04-13T22:00:00.000+00:00", number: "54", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2021-04-21T22:00:00.000+00:00", number: "55", summary: "Neue Updates von Amazon aufgenommen", }, { date: "2021-10-10T22:00:00.000+00:00", number: "56", summary: "Neue Updates von Oracle Linux aufgenommen", }, { date: "2021-10-11T22:00:00.000+00:00", number: "57", summary: "Neue Updates von ORACLE aufgenommen", }, { date: "2022-01-30T23:00:00.000+00:00", number: "58", summary: "Neue Updates von Amazon aufgenommen", }, { date: "2023-01-25T23:00:00.000+00:00", number: "59", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2023-01-26T23:00:00.000+00:00", number: "60", summary: "Neue Updates von SUSE aufgenommen", }, ], status: "final", version: "60", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "Amazon Linux 2", product: { name: "Amazon Linux 2", product_id: "398363", product_identification_helper: { cpe: "cpe:/o:amazon:linux_2:-", }, }, }, ], category: "vendor", name: "Amazon", }, { branches: [ { category: "product_name", name: "Avaya Aura Application Enablement Services", product: { name: "Avaya Aura Application Enablement Services", product_id: "T015516", product_identification_helper: { cpe: "cpe:/a:avaya:aura_application_enablement_services:-", }, }, }, { category: "product_name", name: "Avaya Aura Communication Manager", product: { name: "Avaya Aura Communication Manager", product_id: "T015126", product_identification_helper: { cpe: "cpe:/a:avaya:communication_manager:-", }, }, }, { category: "product_name", name: "Avaya Aura Experience Portal", product: { name: "Avaya Aura Experience Portal", product_id: "T015519", product_identification_helper: { cpe: "cpe:/a:avaya:aura_experience_portal:-", }, }, }, { category: "product_name", name: "Avaya Aura Session Manager", product: { name: "Avaya Aura Session Manager", product_id: "T015127", product_identification_helper: { cpe: "cpe:/a:avaya:session_manager:-", }, }, }, { category: "product_name", name: "Avaya Aura System Manager", product: { name: "Avaya Aura System Manager", product_id: "T015518", product_identification_helper: { cpe: "cpe:/a:avaya:aura_system_manager:-", }, }, }, { category: "product_name", name: "Avaya Web License Manager", product: { name: "Avaya Web License Manager", product_id: "T016243", product_identification_helper: { cpe: "cpe:/a:avaya:web_license_manager:-", }, }, }, ], category: "vendor", name: "Avaya", }, { branches: [ { category: "product_name", name: "Debian Linux", product: { name: "Debian Linux", product_id: "2951", product_identification_helper: { cpe: "cpe:/o:debian:debian_linux:-", }, }, }, ], category: "vendor", name: "Debian", }, { branches: [ { category: "product_name", name: "Open Source Linux Kernel < 5.3.11", product: { name: "Open Source Linux Kernel < 5.3.11", product_id: "6368", product_identification_helper: { cpe: "cpe:/o:linux:linux_kernel:-", }, }, }, ], category: "vendor", name: "Open Source", }, { branches: [ { category: "product_name", name: "Oracle Linux", product: { name: "Oracle Linux", product_id: "T004914", product_identification_helper: { cpe: "cpe:/o:oracle:linux:-", }, }, }, { category: "product_name", name: "Oracle VM", product: { name: "Oracle VM", product_id: "T011119", product_identification_helper: { cpe: "cpe:/a:oracle:vm:-", }, }, }, ], category: "vendor", name: "Oracle", }, { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux", product: { name: "Red Hat Enterprise Linux", product_id: "67646", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:-", }, }, }, ], category: "vendor", name: "Red Hat", }, { branches: [ { category: "product_name", name: "SUSE Linux", product: { name: "SUSE Linux", product_id: "T002207", product_identification_helper: { cpe: "cpe:/o:suse:suse_linux:-", }, }, }, ], category: "vendor", name: "SUSE", }, { branches: [ { category: "product_name", name: "Ubuntu Linux", product: { name: "Ubuntu Linux", product_id: "T000126", product_identification_helper: { cpe: "cpe:/o:canonical:ubuntu_linux:-", }, }, }, ], category: "vendor", name: "Ubuntu", }, ], }, vulnerabilities: [ { cve: "CVE-2019-19043", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19043", }, { cve: "CVE-2019-19044", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19044", }, { cve: "CVE-2019-19045", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19045", }, { cve: "CVE-2019-19046", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19046", }, { cve: "CVE-2019-19047", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19047", }, { cve: "CVE-2019-19048", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19048", }, { cve: "CVE-2019-19049", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19049", }, { cve: "CVE-2019-19050", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19050", }, { cve: "CVE-2019-19051", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19051", }, { cve: "CVE-2019-19052", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19052", }, { cve: "CVE-2019-19053", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19053", }, { cve: "CVE-2019-19054", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19054", }, { cve: "CVE-2019-19055", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19055", }, { cve: "CVE-2019-19056", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19056", }, { cve: "CVE-2019-19057", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19057", }, { cve: "CVE-2019-19058", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19058", }, { cve: "CVE-2019-19059", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19059", }, { cve: "CVE-2019-19060", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19060", }, { cve: "CVE-2019-19061", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19061", }, { cve: "CVE-2019-19062", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19062", }, { cve: "CVE-2019-19063", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19063", }, { cve: "CVE-2019-19064", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19064", }, { cve: "CVE-2019-19065", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19065", }, { cve: "CVE-2019-19066", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19066", }, { cve: "CVE-2019-19067", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19067", }, { cve: "CVE-2019-19068", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19068", }, { cve: "CVE-2019-19069", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19069", }, { cve: "CVE-2019-19070", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19070", }, { cve: "CVE-2019-19071", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19071", }, { cve: "CVE-2019-19072", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19072", }, { cve: "CVE-2019-19073", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19073", }, { cve: "CVE-2019-19074", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19074", }, { cve: "CVE-2019-19075", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19075", }, { cve: "CVE-2019-19076", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19076", }, { cve: "CVE-2019-19077", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19077", }, { cve: "CVE-2019-19078", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19078", }, { cve: "CVE-2019-19079", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19079", }, { cve: "CVE-2019-19080", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19080", }, { cve: "CVE-2019-19081", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19081", }, { cve: "CVE-2019-19082", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19082", }, { cve: "CVE-2019-19083", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19083", }, ], }
WID-SEC-W-2023-0198
Vulnerability from csaf_certbund
Notes
{ document: { aggregate_severity: { text: "mittel", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Der Kernel stellt den Kern des Linux Betriebssystems dar.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuführen.", title: "Angriff", }, { category: "general", text: "- Linux", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2023-0198 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2019/wid-sec-w-2023-0198.json", }, { category: "self", summary: "WID-SEC-2023-0198 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0198", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:0152-1 vom 2023-01-26", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-January/013530.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:0134-1 vom 2023-01-25", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-January/013523.html", }, { category: "external", summary: "Ubuntu Security Notice USN-4226-1 vom 2020-01-07", url: "https://usn.ubuntu.com/4226-1/", }, { category: "external", summary: "Ubuntu Security Notice USN-4227-1 vom 2020-01-07", url: "https://usn.ubuntu.com/4227-1/", }, { category: "external", summary: "Ubuntu Security Notice USN-4228-1 vom 2020-01-07", url: "https://usn.ubuntu.com/4228-1/", }, { category: "external", summary: "Ubuntu Security Notice USN-4225-1 vom 2020-01-07", url: "https://usn.ubuntu.com/4225-1/", }, { category: "external", summary: "Ubuntu Security Notice USN-4225-2 vom 2020-01-18", url: "https://packetstormsecurity.com/files/155995/USN-4225-2.txt", }, { category: "external", summary: "Ubuntu Security Notice USN-4254-1 vom 2020-01-28", url: "https://usn.ubuntu.com/4254-1/", }, { category: "external", summary: "Ubuntu Security Notice USN-4228-2 vom 2020-01-07", url: "https://usn.ubuntu.com/4228-2/", }, { category: "external", summary: "Ubuntu Security Notice USN-4227-2 vom 2020-01-07", url: "https://usn.ubuntu.com/4227-2/", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:0093-1 vom 2020-01-14", url: "https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19043", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19044", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19045", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19046", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19047", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19048", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19049", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19050", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19051", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19052", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19053", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19054", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19055", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19056", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19057", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19058", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19059", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19060", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19061", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19062", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19063", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19064", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19065", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19066", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19067", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19068", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19069", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19070", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19071", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19072", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19073", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19074", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19075", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19076", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19077", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19078", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19079", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19080", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19081", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19082", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19083", }, { category: "external", summary: "Ubuntu Security Notice USN-4209-1 vom 2019-12-03", url: "https://usn.ubuntu.com/4209-1/", }, { category: "external", summary: "Ubuntu Security Notice USN-4208-1 vom 2019-12-03", url: "https://usn.ubuntu.com/4208-1/", }, { category: "external", summary: "Ubuntu Security Notice USN-4210-1 vom 2019-12-03", url: "https://usn.ubuntu.com/4210-1/", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2019:3200-1 vom 2019-12-07", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193200-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2019:3289-1 vom 2019-12-13", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193289-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2019:3316-1 vom 2019-12-18", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193316-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2019:3317-1 vom 2019-12-18", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193317-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2019:3371-1 vom 2019-12-20", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193371-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2019:3379-1 vom 2019-12-21", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193379-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2019:3372-1 vom 2019-12-20", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2019:3381-1 vom 2019-12-23", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193381-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2019:3389-1 vom 2019-12-28", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193389-1.html", }, { category: "external", summary: "Ubuntu Security Notice USN-4258-1 vom 2020-01-29", url: "https://usn.ubuntu.com/4258-1/", }, { category: "external", summary: "Ubuntu Security Notice USN-4254-2 vom 2020-01-29", url: "https://usn.ubuntu.com/4254-2/", }, { category: "external", summary: "Ubuntu Security Notice USN-4284-1 vom 2020-02-18", url: "https://usn.ubuntu.com/4284-1/", }, { category: "external", summary: "Ubuntu Security Notice USN-4287-1 vom 2020-02-18", url: "https://usn.ubuntu.com/4287-2/", }, { category: "external", summary: "Ubuntu Security Notice USN-4286-1 vom 2020-02-18", url: "https://usn.ubuntu.com/4286-2/", }, { category: "external", summary: "Ubuntu Security Notice USN-4285-1 vom 2020-02-18", url: "https://usn.ubuntu.com/4285-1/", }, { category: "external", summary: "EMC Security Advisory DSA-2020-053 vom 2020-02-27", url: "https://www.dell.com/support/security/de-de/details/DOC-111088/DSA-2020-053-RSA&", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:0511-1 vom 2020-02-28", url: "https://www.suse.com/support/update/announcement/2020/suse-su-20200511-1.html", }, { category: "external", summary: "Debian Security Advisory DLA 2068 vom 2020-03-02", url: "https://lists.debian.org/debian-lts-announce/2020/debian-lts-announce-202001/msg00013.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:0560-1 vom 2020-03-03", url: "https://www.suse.com/support/update/announcement/2020/suse-su-20200560-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:0559-1 vom 2020-03-02", url: "https://www.suse.com/support/update/announcement/2020/suse-su-20200559-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:0558-1 vom 2020-03-02", url: "https://www.suse.com/support/update/announcement/2020/suse-su-20200558-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:0580-1 vom 2020-03-04", url: "https://www.suse.com/support/update/announcement/2020/suse-su-20200580-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:0584-1 vom 2020-03-04", url: "https://www.suse.com/support/update/announcement/2020/suse-su-20200584-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:0599-1 vom 2020-03-06", url: "https://www.suse.com/support/update/announcement/2020/suse-su-20200599-1.html", }, { category: "external", summary: "Debian Security Advisory DLA 2131 vom 2020-03-05", url: "https://lists.debian.org/debian-lts-announce/2020/debian-lts-announce-202003/msg00001.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:0605-1 vom 2020-03-06", url: "https://www.suse.com/support/update/announcement/2020/suse-su-20200605-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:0613-1 vom 2020-03-10", url: "https://www.suse.com/support/update/announcement/2020/suse-su-20200613-1.html", }, { category: "external", summary: "Ubuntu Security Notice USN-4300-1 vom 2020-03-17", url: "https://usn.ubuntu.com/4300-1/", }, { category: "external", summary: "Ubuntu Security Notice USN-4302-1 vom 2020-03-17", url: "https://usn.ubuntu.com/4302-1/", }, { category: "external", summary: "Ubuntu Security Notice USN-4319-1 vom 2020-04-06", url: "https://usn.ubuntu.com/4319-1/", }, { category: "external", summary: "Ubuntu Security Notice USN-4325-1 vom 2020-04-08", url: "https://usn.ubuntu.com/4325-1/", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:1769 vom 2020-04-28", url: "https://access.redhat.com/errata/RHSA-2020:1769", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:1567 vom 2020-04-28", url: "https://access.redhat.com/errata/RHSA-2020:1567", }, { category: "external", summary: "Ubuntu Security Notice USN-4344-1 vom 2020-04-29", url: "https://usn.ubuntu.com/4344-1/", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:14354-1 vom 2020-05-01", url: "https://www.suse.com/support/update/announcement/2020/suse-su-202014354-1.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2020-5670 vom 2020-05-07", url: "https://oss.oracle.com/pipermail/el-errata/2020-May/009889.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2020-5670 vom 2020-05-07", url: "https://oss.oracle.com/pipermail/el-errata/2020-May/009888.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2020-1769 vom 2020-05-13", url: "https://oss.oracle.com/pipermail/el-errata/2020-May/009919.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:1255-1 vom 2020-05-15", url: "https://www.suse.com/support/update/announcement/2020/suse-su-20201255-1.html", }, { category: "external", summary: "Ubuntu Security Notice USN-4364-1 vom 2020-05-19", url: "https://usn.ubuntu.com/4364-1/", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:1275-1 vom 2020-05-21", url: "https://www.suse.com/support/update/announcement/2020/suse-su-20201275-1.html", }, { category: "external", summary: "ORACLE OVMSA-2020-0019 vom 2020-06-04", url: "https://oss.oracle.com/pipermail/oraclevm-errata/2020-June/000980.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2020-5708 vom 2020-06-04", url: "https://oss.oracle.com/pipermail/el-errata/2020-June/009990.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2020-5708 vom 2020-06-04", url: "https://oss.oracle.com/pipermail/el-errata/2020-June/009989.html", }, { category: "external", summary: "ORACLE OVMSA-2020-0020 vom 2020-06-06", url: "https://oss.oracle.com/pipermail/oraclevm-errata/2020-June/000983.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:1663-1 vom 2020-06-18", url: "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:2854 vom 2020-07-07", url: "https://access.redhat.com/errata/RHSA-2020:2854", }, { category: "external", summary: "ORACLE OVMSA-2020-0032 vom 2020-08-08", url: "https://oss.oracle.com/pipermail/oraclevm-errata/2020-August/000992.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:3545 vom 2020-08-25", url: "https://access.redhat.com/errata/RHSA-2020:3545", }, { category: "external", summary: "ORACLE OVMSA-2020-0041 vom 2020-09-04", url: "https://oss.oracle.com/pipermail/oraclevm-errata/2020-September/000999.html", }, { category: "external", summary: "Ubuntu Security Notice USN-4526-1 vom 2020-09-22", url: "https://usn.ubuntu.com/4526-1/", }, { category: "external", summary: "Ubuntu Security Notice USN-4526-1 vom 2020-09-22", url: "https://ubuntu.com/security/notices/USN-4526-1", }, { category: "external", summary: "Ubuntu Security Notice USN-4525-1 vom 2020-09-22", url: "https://usn.ubuntu.com/4525-1/", }, { category: "external", summary: "Ubuntu Security Notice USN-4527-1 vom 2020-09-22", url: "https://usn.ubuntu.com/4527-1/", }, { category: "external", summary: "Ubuntu Security Notice USN-4904-1 vom 2021-04-14", url: "https://ubuntu.com/security/notices/USN-4904-1", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:4062 vom 2020-09-29", url: "https://access.redhat.com/errata/RHSA-2020:4062", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:4060 vom 2020-09-29", url: "https://access.redhat.com/errata/RHSA-2020:4060", }, { category: "external", summary: "ORACLE OVMSA-2020-0044 vom 2020-10-09", url: "https://oss.oracle.com/pipermail/oraclevm-errata/2020-October/001000.html", }, { category: "external", summary: "AVAYA Security Advisory ASA-2020-140 vom 2020-10-14", url: "https://downloads.avaya.com/css/P8/documents/101071393", }, { category: "external", summary: "Debian Security Advisory DLA-2420 vom 2020-10-30", url: "https://lists.debian.org/debian-lts-announce/2020/debian-lts-announce-202010/msg00032.html", }, { category: "external", summary: "Debian Security Advisory DLA-2420 vom 2020-10-31", url: "https://lists.debian.org/debian-lts-announce/2020/debian-lts-announce-202010/msg00034.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:4431 vom 2020-11-04", url: "https://access.redhat.com/errata/RHSA-2020:4431", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:4609 vom 2020-11-04", url: "https://access.redhat.com/errata/RHSA-2020:4609", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:5206 vom 2020-11-24", url: "https://access.redhat.com/errata/RHSA-2020:5206", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:3503-1 vom 2020-11-24", url: "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html", }, { category: "external", summary: "Amazon Linux Security Advisory ALAS-2021-1627 vom 2021-04-22", url: "https://alas.aws.amazon.com/AL2/ALAS-2021-1627.html", }, { category: "external", summary: "AVAYA Security Advisory ASA-2020-155 vom 2020-12-08", url: "https://downloads.avaya.com/css/P8/documents/101072832", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:5656 vom 2020-12-22", url: "https://access.redhat.com/errata/RHSA-2020:5656", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2021:0437-1 vom 2021-02-11", url: "https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2021-9473 vom 2021-10-08", url: "http://linux.oracle.com/errata/ELSA-2021-9473.html", }, { category: "external", summary: "ORACLE OVMSA-2021-0035 vom 2021-10-12", url: "https://oss.oracle.com/pipermail/oraclevm-errata/2021-October/001033.html", }, { category: "external", summary: "Amazon Linux Security Advisory ALASKERNEL-5.4-2022-014 vom 2022-01-31", url: "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2022-014.html", }, ], source_lang: "en-US", title: "Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service", tracking: { current_release_date: "2023-01-26T23:00:00.000+00:00", generator: { date: "2024-08-15T17:42:18.159+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2023-0198", initial_release_date: "2019-11-17T23:00:00.000+00:00", revision_history: [ { date: "2019-11-17T23:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2019-11-24T23:00:00.000+00:00", number: "2", summary: "Referenz(en) aufgenommen: FEDORA-2019-34A75D7E61, FEDORA-2019-021C968423", }, { date: "2019-11-26T23:00:00.000+00:00", number: "3", summary: "Referenz(en) aufgenommen: FEDORA-2019-8846A1A5A2, FEDORA-2019-91F6E7BB71", }, { date: "2019-12-02T23:00:00.000+00:00", number: "4", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2019-12-08T23:00:00.000+00:00", number: "5", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2019-12-12T23:00:00.000+00:00", number: "6", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2019-12-17T23:00:00.000+00:00", number: "7", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2019-12-22T23:00:00.000+00:00", number: "8", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2019-12-23T23:00:00.000+00:00", number: "9", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2019-12-29T23:00:00.000+00:00", number: "10", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2020-01-06T23:00:00.000+00:00", number: "11", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2020-01-07T23:00:00.000+00:00", number: "12", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2020-01-14T23:00:00.000+00:00", number: "13", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2020-01-19T23:00:00.000+00:00", number: "14", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2020-01-27T23:00:00.000+00:00", number: "15", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2020-01-28T23:00:00.000+00:00", number: "16", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2020-02-18T23:00:00.000+00:00", number: "17", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2020-02-26T23:00:00.000+00:00", number: "18", summary: "Neue Updates von EMC aufgenommen", }, { date: "2020-02-27T23:00:00.000+00:00", number: "19", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2020-03-02T23:00:00.000+00:00", number: "20", summary: "Neue Updates von Debian und SUSE aufgenommen", }, { date: "2020-03-04T23:00:00.000+00:00", number: "21", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2020-03-05T23:00:00.000+00:00", number: "22", summary: "Neue Updates von SUSE und Debian aufgenommen", }, { date: "2020-03-08T23:00:00.000+00:00", number: "23", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2020-03-09T23:00:00.000+00:00", number: "24", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2020-03-16T23:00:00.000+00:00", number: "25", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2020-04-06T22:00:00.000+00:00", number: "26", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2020-04-07T22:00:00.000+00:00", number: "27", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2020-04-28T22:00:00.000+00:00", number: "28", summary: "Neue Updates von Red Hat und Ubuntu aufgenommen", }, { date: "2020-05-03T22:00:00.000+00:00", number: "29", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2020-05-06T22:00:00.000+00:00", number: "30", summary: "Neue Updates von Oracle Linux aufgenommen", }, { date: "2020-05-13T22:00:00.000+00:00", number: "31", summary: "Neue Updates von Oracle Linux aufgenommen", }, { date: "2020-05-14T22:00:00.000+00:00", number: "32", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2020-05-18T22:00:00.000+00:00", number: "33", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2020-05-21T22:00:00.000+00:00", number: "34", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2020-06-03T22:00:00.000+00:00", number: "35", summary: "Neue Updates von ORACLE aufgenommen", }, { date: "2020-06-04T22:00:00.000+00:00", number: "36", summary: "Neue Updates von Oracle Linux aufgenommen", }, { date: "2020-06-07T22:00:00.000+00:00", number: "37", summary: "Neue Updates von ORACLE aufgenommen", }, { date: "2020-06-18T22:00:00.000+00:00", number: "38", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2020-07-07T22:00:00.000+00:00", number: "39", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2020-08-09T22:00:00.000+00:00", number: "40", summary: "Neue Updates von ORACLE aufgenommen", }, { date: "2020-08-25T22:00:00.000+00:00", number: "41", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2020-09-06T22:00:00.000+00:00", number: "42", summary: "Neue Updates von ORACLE aufgenommen", }, { date: "2020-09-21T22:00:00.000+00:00", number: "43", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2020-09-29T22:00:00.000+00:00", number: "44", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2020-10-11T22:00:00.000+00:00", number: "45", summary: "Neue Updates von ORACLE aufgenommen", }, { date: "2020-10-13T22:00:00.000+00:00", number: "46", summary: "Neue Updates von AVAYA aufgenommen", }, { date: "2020-11-01T23:00:00.000+00:00", number: "47", summary: "Neue Updates von Debian aufgenommen", }, { date: "2020-11-03T23:00:00.000+00:00", number: "48", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2020-11-23T23:00:00.000+00:00", number: "49", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2020-11-24T23:00:00.000+00:00", number: "50", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2020-12-09T23:00:00.000+00:00", number: "51", summary: "Neue Updates von AVAYA aufgenommen", }, { date: "2020-12-21T23:00:00.000+00:00", number: "52", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2021-02-11T23:00:00.000+00:00", number: "53", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2021-04-13T22:00:00.000+00:00", number: "54", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2021-04-21T22:00:00.000+00:00", number: "55", summary: "Neue Updates von Amazon aufgenommen", }, { date: "2021-10-10T22:00:00.000+00:00", number: "56", summary: "Neue Updates von Oracle Linux aufgenommen", }, { date: "2021-10-11T22:00:00.000+00:00", number: "57", summary: "Neue Updates von ORACLE aufgenommen", }, { date: "2022-01-30T23:00:00.000+00:00", number: "58", summary: "Neue Updates von Amazon aufgenommen", }, { date: "2023-01-25T23:00:00.000+00:00", number: "59", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2023-01-26T23:00:00.000+00:00", number: "60", summary: "Neue Updates von SUSE aufgenommen", }, ], status: "final", version: "60", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "Amazon Linux 2", product: { name: "Amazon Linux 2", product_id: "398363", product_identification_helper: { cpe: "cpe:/o:amazon:linux_2:-", }, }, }, ], category: "vendor", name: "Amazon", }, { branches: [ { category: "product_name", name: "Avaya Aura Application Enablement Services", product: { name: "Avaya Aura Application Enablement Services", product_id: "T015516", product_identification_helper: { cpe: "cpe:/a:avaya:aura_application_enablement_services:-", }, }, }, { category: "product_name", name: "Avaya Aura Communication Manager", product: { name: "Avaya Aura Communication Manager", product_id: "T015126", product_identification_helper: { cpe: "cpe:/a:avaya:communication_manager:-", }, }, }, { category: "product_name", name: "Avaya Aura Experience Portal", product: { name: "Avaya Aura Experience Portal", product_id: "T015519", product_identification_helper: { cpe: "cpe:/a:avaya:aura_experience_portal:-", }, }, }, { category: "product_name", name: "Avaya Aura Session Manager", product: { name: "Avaya Aura Session Manager", product_id: "T015127", product_identification_helper: { cpe: "cpe:/a:avaya:session_manager:-", }, }, }, { category: "product_name", name: "Avaya Aura System Manager", product: { name: "Avaya Aura System Manager", product_id: "T015518", product_identification_helper: { cpe: "cpe:/a:avaya:aura_system_manager:-", }, }, }, { category: "product_name", name: "Avaya Web License Manager", product: { name: "Avaya Web License Manager", product_id: "T016243", product_identification_helper: { cpe: "cpe:/a:avaya:web_license_manager:-", }, }, }, ], category: "vendor", name: "Avaya", }, { branches: [ { category: "product_name", name: "Debian Linux", product: { name: "Debian Linux", product_id: "2951", product_identification_helper: { cpe: "cpe:/o:debian:debian_linux:-", }, }, }, ], category: "vendor", name: "Debian", }, { branches: [ { category: "product_name", name: "Open Source Linux Kernel < 5.3.11", product: { name: "Open Source Linux Kernel < 5.3.11", product_id: "6368", product_identification_helper: { cpe: "cpe:/o:linux:linux_kernel:-", }, }, }, ], category: "vendor", name: "Open Source", }, { branches: [ { category: "product_name", name: "Oracle Linux", product: { name: "Oracle Linux", product_id: "T004914", product_identification_helper: { cpe: "cpe:/o:oracle:linux:-", }, }, }, { category: "product_name", name: "Oracle VM", product: { name: "Oracle VM", product_id: "T011119", product_identification_helper: { cpe: "cpe:/a:oracle:vm:-", }, }, }, ], category: "vendor", name: "Oracle", }, { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux", product: { name: "Red Hat Enterprise Linux", product_id: "67646", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:-", }, }, }, ], category: "vendor", name: "Red Hat", }, { branches: [ { category: "product_name", name: "SUSE Linux", product: { name: "SUSE Linux", product_id: "T002207", product_identification_helper: { cpe: "cpe:/o:suse:suse_linux:-", }, }, }, ], category: "vendor", name: "SUSE", }, { branches: [ { category: "product_name", name: "Ubuntu Linux", product: { name: "Ubuntu Linux", product_id: "T000126", product_identification_helper: { cpe: "cpe:/o:canonical:ubuntu_linux:-", }, }, }, ], category: "vendor", name: "Ubuntu", }, ], }, vulnerabilities: [ { cve: "CVE-2019-19043", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19043", }, { cve: "CVE-2019-19044", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19044", }, { cve: "CVE-2019-19045", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19045", }, { cve: "CVE-2019-19046", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19046", }, { cve: "CVE-2019-19047", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19047", }, { cve: "CVE-2019-19048", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19048", }, { cve: "CVE-2019-19049", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19049", }, { cve: "CVE-2019-19050", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19050", }, { cve: "CVE-2019-19051", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19051", }, { cve: "CVE-2019-19052", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19052", }, { cve: "CVE-2019-19053", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19053", }, { cve: "CVE-2019-19054", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19054", }, { cve: "CVE-2019-19055", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19055", }, { cve: "CVE-2019-19056", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19056", }, { cve: "CVE-2019-19057", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19057", }, { cve: "CVE-2019-19058", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19058", }, { cve: "CVE-2019-19059", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19059", }, { cve: "CVE-2019-19060", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19060", }, { cve: "CVE-2019-19061", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19061", }, { cve: "CVE-2019-19062", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19062", }, { cve: "CVE-2019-19063", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19063", }, { cve: "CVE-2019-19064", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19064", }, { cve: "CVE-2019-19065", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19065", }, { cve: "CVE-2019-19066", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19066", }, { cve: "CVE-2019-19067", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19067", }, { cve: "CVE-2019-19068", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19068", }, { cve: "CVE-2019-19069", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19069", }, { cve: "CVE-2019-19070", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19070", }, { cve: "CVE-2019-19071", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19071", }, { cve: "CVE-2019-19072", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19072", }, { cve: "CVE-2019-19073", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19073", }, { cve: "CVE-2019-19074", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19074", }, { cve: "CVE-2019-19075", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19075", }, { cve: "CVE-2019-19076", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19076", }, { cve: "CVE-2019-19077", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19077", }, { cve: "CVE-2019-19078", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19078", }, { cve: "CVE-2019-19079", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19079", }, { cve: "CVE-2019-19080", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19080", }, { cve: "CVE-2019-19081", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19081", }, { cve: "CVE-2019-19082", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19082", }, { cve: "CVE-2019-19083", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19083", }, ], }
ghsa-p29h-v652-9mxm
Vulnerability from github
Two memory leaks in the v3d_submit_cl_ioctl() function in drivers/gpu/drm/v3d/v3d_gem.c in the Linux kernel before 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering kcalloc() or v3d_job_init() failures, aka CID-29cd13cfd762.
{ affected: [], aliases: [ "CVE-2019-19044", ], database_specific: { cwe_ids: [ "CWE-401", ], github_reviewed: false, github_reviewed_at: null, nvd_published_at: "2019-11-18T06:15:00Z", severity: "HIGH", }, details: "Two memory leaks in the v3d_submit_cl_ioctl() function in drivers/gpu/drm/v3d/v3d_gem.c in the Linux kernel before 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering kcalloc() or v3d_job_init() failures, aka CID-29cd13cfd762.", id: "GHSA-p29h-v652-9mxm", modified: "2022-11-07T19:00:21Z", published: "2022-05-24T17:01:28Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19044", }, { type: "WEB", url: "https://github.com/torvalds/linux/commit/29cd13cfd7624726d9e6becbae9aa419ef35af7f", }, { type: "WEB", url: "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.11", }, { type: "WEB", url: "https://security.netapp.com/advisory/ntap-20191205-0001", }, { type: "WEB", url: "https://usn.ubuntu.com/4225-1", }, ], schema_version: "1.4.0", severity: [ { score: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", type: "CVSS_V3", }, ], }
var-201911-1397
Vulnerability from variot
Two memory leaks in the v3d_submit_cl_ioctl() function in drivers/gpu/drm/v3d/v3d_gem.c in the Linux kernel before 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering kcalloc() or v3d_job_init() failures, aka CID-29cd13cfd762. Linux Kernel Contains a resource exhaustion vulnerability. Vendors have confirmed this vulnerability CID-29cd13cfd762 It is released as.Service operation interruption (DoS) There is a possibility of being put into a state. ========================================================================= Ubuntu Security Notice USN-4225-1 January 07, 2020
linux, linux-aws, linux-azure, linux-azure-5.3, linux-gcp, linux-gcp-5.3, linux-kvm, linux-oracle, linux-raspi2 vulnerabilities ========================================================================= A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 19.10
- Ubuntu 18.04 LTS
Summary:
Several security issues were fixed in the Linux kernel. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-14895, CVE-2019-14901)
It was discovered that a heap-based buffer overflow existed in the Marvell Libertas WLAN Driver for the Linux kernel. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-14896, CVE-2019-14897)
It was discovered that the Fujitsu ES network device driver for the Linux kernel did not properly check for errors in some situations, leading to a NULL pointer dereference. A local attacker could use this to cause a denial of service. (CVE-2019-16231)
Anthony Steinhauser discovered that the Linux kernel did not properly perform Spectre_RSB mitigations to all processors for PowerPC architecture systems in some situations. A local attacker could use this to expose sensitive information. (CVE-2019-18660)
It was discovered that the Broadcom V3D DRI driver in the Linux kernel did not properly deallocate memory in certain error conditions. (CVE-2019-19044)
It was discovered that the Mellanox Technologies Innova driver in the Linux kernel did not properly deallocate memory in certain failure conditions. (CVE-2019-19045)
It was discovered that the Mellanox Technologies ConnectX driver in the Linux kernel did not properly deallocate memory in certain failure conditions. (CVE-2019-19047)
It was discovered that the Intel WiMAX 2400 driver in the Linux kernel did not properly deallocate memory in certain situations. (CVE-2019-19051)
It was discovered that Geschwister Schneider USB CAN interface driver in the Linux kernel did not properly deallocate memory in certain failure conditions. (CVE-2019-19052)
It was discovered that the netlink-based 802.11 configuration interface in the Linux kernel did not deallocate memory in certain error conditions. (CVE-2019-19055)
It was discovered that the event tracing subsystem of the Linux kernel did not properly deallocate memory in certain error conditions. A physically proximate attacker could possibly use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2019-19524)
It was discovered that the Microchip CAN BUS Analyzer driver in the Linux kernel contained a use-after-free vulnerability on device disconnect. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-19529)
It was discovered that the PEAK-System Technik USB driver in the Linux kernel did not properly sanitize memory before sending it to the device. A physically proximate attacker could use this to expose sensitive information (kernel memory). A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-19807)
It was discovered that the DesignWare USB3 controller driver in the Linux kernel did not properly deallocate memory in some error conditions. (CVE-2019-18813)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 19.10: linux-image-5.3.0-1008-oracle 5.3.0-1008.9 linux-image-5.3.0-1009-aws 5.3.0-1009.10 linux-image-5.3.0-1009-azure 5.3.0-1009.10 linux-image-5.3.0-1009-kvm 5.3.0-1009.10 linux-image-5.3.0-1011-gcp 5.3.0-1011.12 linux-image-5.3.0-1015-raspi2 5.3.0-1015.17 linux-image-5.3.0-26-generic 5.3.0-26.28 linux-image-5.3.0-26-generic-lpae 5.3.0-26.28 linux-image-5.3.0-26-lowlatency 5.3.0-26.28 linux-image-5.3.0-26-snapdragon 5.3.0-26.28 linux-image-aws 5.3.0.1009.11 linux-image-azure 5.3.0.1009.27 linux-image-gcp 5.3.0.1011.12 linux-image-generic 5.3.0.26.30 linux-image-generic-lpae 5.3.0.26.30 linux-image-gke 5.3.0.1011.12 linux-image-kvm 5.3.0.1009.11 linux-image-lowlatency 5.3.0.26.30 linux-image-oracle 5.3.0.1008.9 linux-image-raspi2 5.3.0.1015.12 linux-image-snapdragon 5.3.0.26.30 linux-image-virtual 5.3.0.26.30
Ubuntu 18.04 LTS: linux-image-5.3.0-1009-azure 5.3.0-1009.10~18.04.1 linux-image-5.3.0-1010-gcp 5.3.0-1010.11~18.04.1 linux-image-azure-edge 5.3.0.1009.9 linux-image-gcp-edge 5.3.0.1010.10
After a standard system update you need to reboot your computer to make all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well.
References: https://usn.ubuntu.com/4225-1 CVE-2019-14895, CVE-2019-14896, CVE-2019-14897, CVE-2019-14901, CVE-2019-16231, CVE-2019-18660, CVE-2019-18813, CVE-2019-19044, CVE-2019-19045, CVE-2019-19047, CVE-2019-19051, CVE-2019-19052, CVE-2019-19055, CVE-2019-19072, CVE-2019-19524, CVE-2019-19529, CVE-2019-19534, CVE-2019-19807
Package Information: https://launchpad.net/ubuntu/+source/linux/5.3.0-26.28 https://launchpad.net/ubuntu/+source/linux-aws/5.3.0-1009.10 https://launchpad.net/ubuntu/+source/linux-azure/5.3.0-1009.10 https://launchpad.net/ubuntu/+source/linux-gcp/5.3.0-1011.12 https://launchpad.net/ubuntu/+source/linux-kvm/5.3.0-1009.10 https://launchpad.net/ubuntu/+source/linux-oracle/5.3.0-1008.9 https://launchpad.net/ubuntu/+source/linux-raspi2/5.3.0-1015.17 https://launchpad.net/ubuntu/+source/linux-azure-5.3/5.3.0-1009.10~18.04.1 https://launchpad.net/ubuntu/+source/linux-gcp-5.3/5.3.0-1010.11~18.04.1
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-201911-1397", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "kernel", scope: "lt", trust: 1.8, vendor: "linux", version: "5.3.11", }, { model: "data availability services", scope: "eq", trust: 1, vendor: "netapp", version: null, }, { model: "e-series santricity os controller", scope: "eq", trust: 1, vendor: "netapp", version: "11.40", }, { model: "e-series santricity os controller", scope: "eq", trust: 1, vendor: "netapp", version: "11.40.5", }, { model: "hci compute node", scope: "eq", trust: 1, vendor: "netapp", version: null, }, { model: "hci baseboard management controller", scope: "eq", trust: 1, vendor: "netapp", version: "h610s", }, { model: "e-series santricity os controller", scope: "eq", trust: 1, vendor: "netapp", version: "11.50.1", }, { model: "steelstore cloud integrated storage", scope: "eq", trust: 1, vendor: "netapp", version: null, }, { model: "e-series santricity os controller", scope: "eq", trust: 1, vendor: "netapp", version: "11.60", }, { model: "e-series santricity os controller", scope: "eq", trust: 1, vendor: "netapp", version: "11.60.3", }, { model: "e-series santricity os controller", scope: "eq", trust: 1, vendor: "netapp", version: "11.30", }, { model: "e-series santricity os controller", scope: "eq", trust: 1, vendor: "netapp", version: "11.25", }, { model: "e-series santricity os controller", scope: "eq", trust: 1, vendor: "netapp", version: "11.60.0", }, { model: "aff baseboard management controller", scope: "eq", trust: 1, vendor: "netapp", version: null, }, { model: "e-series santricity os controller", scope: "eq", trust: 1, vendor: "netapp", version: "11.40.3r2", }, { model: "active iq unified manager", scope: "eq", trust: 1, vendor: "netapp", version: null, }, { model: "e-series santricity os controller", scope: "eq", trust: 1, vendor: "netapp", version: "11.60.1", }, { model: "ubuntu linux", scope: "eq", trust: 1, vendor: "canonical", version: "18.04", }, { model: "e-series santricity os controller", scope: "eq", trust: 1, vendor: "netapp", version: "11.0", }, { model: "e-series santricity os controller", scope: "eq", trust: 1, vendor: "netapp", version: "11.70.2", }, { model: "solidfire baseboard management controller", scope: "eq", trust: 1, vendor: "netapp", version: null, }, { model: "solidfire \\& hci management node", scope: "eq", trust: 1, vendor: "netapp", version: null, }, { model: "brocade fabric operating system", scope: "eq", trust: 1, vendor: "broadcom", version: null, }, { model: "kernel", scope: "gte", trust: 1, vendor: "linux", version: "5.3", }, { model: "e-series santricity os controller", scope: "eq", trust: 1, vendor: "netapp", version: "11.70.1", }, { model: "solidfire\\, enterprise sds \\& hci storage node", scope: "eq", trust: 1, vendor: "netapp", version: null, }, { model: "cloud backup", scope: "eq", trust: 1, vendor: "netapp", version: null, }, { model: "e-series santricity os controller", scope: "eq", trust: 1, vendor: "netapp", version: "11.20", }, { model: "ubuntu linux", scope: "eq", trust: 1, vendor: "canonical", version: "19.10", }, { model: "fas\\/aff baseboard management controller", scope: "eq", trust: 1, vendor: "netapp", version: null, }, { model: "e-series santricity os controller", scope: "eq", trust: 1, vendor: "netapp", version: "11.0.0", }, { model: "e-series santricity os controller", scope: "eq", trust: 1, vendor: "netapp", version: "11.30.5r3", }, { model: "e-series santricity os controller", scope: "eq", trust: 1, vendor: "netapp", version: "11.50.2", }, ], sources: [ { db: "JVNDB", id: "JVNDB-2019-011984", }, { db: "NVD", id: "CVE-2019-19044", }, ], }, configurations: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", children: { "@container": "@list", }, cpe_match: { "@container": "@list", }, data: { "@container": "@list", }, nodes: { "@container": "@list", }, }, data: [ { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "5.3.11", versionStartIncluding: "5.3", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:aff_baseboard_management_controller:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:data_availability_services:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:solidfire_\\&_hci_management_node:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:solidfire\\,_enterprise_sds_\\&_hci_storage_node:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:broadcom:brocade_fabric_operating_system_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:fas\\/aff_baseboard_management_controller:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.0.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.25:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.30.5r3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.40:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.40.3r2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.40.5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.50.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.50.2:-:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.50.2:p1:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.60:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.60.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.60.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.60.3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.70.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.70.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:hci_baseboard_management_controller:h610s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netapp:hci_compute_node_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netapp:solidfire_baseboard_management_controller_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netapp:solidfire_baseboard_management_controller:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, ], }, ], sources: [ { db: "NVD", id: "CVE-2019-19044", }, ], }, credits: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Ubuntu", sources: [ { db: "PACKETSTORM", id: "155853", }, { db: "CNNVD", id: "CNNVD-201911-1064", }, ], trust: 0.7, }, cve: "CVE-2019-19044", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { acInsufInfo: false, accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", author: "NVD", availabilityImpact: "COMPLETE", baseScore: 7.8, confidentialityImpact: "NONE", exploitabilityScore: 10, impactScore: 6.9, integrityImpact: "NONE", obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "HIGH", trust: 1, userInteractionRequired: false, vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C", version: "2.0", }, { acInsufInfo: null, accessComplexity: "Low", accessVector: "Network", authentication: "None", author: "NVD", availabilityImpact: "Complete", baseScore: 7.8, confidentialityImpact: "None", exploitabilityScore: null, id: "CVE-2019-19044", impactScore: null, integrityImpact: "None", obtainAllPrivilege: null, obtainOtherPrivilege: null, obtainUserPrivilege: null, severity: "High", trust: 0.8, userInteractionRequired: null, vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C", version: "2.0", }, { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", author: "VULHUB", availabilityImpact: "COMPLETE", baseScore: 7.8, confidentialityImpact: "NONE", exploitabilityScore: 10, id: "VHN-151451", impactScore: 6.9, integrityImpact: "NONE", severity: "HIGH", trust: 0.1, vectorString: "AV:N/AC:L/AU:N/C:N/I:N/A:C", version: "2.0", }, ], cvssV3: [ { attackComplexity: "LOW", attackVector: "NETWORK", author: "NVD", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", exploitabilityScore: 3.9, impactScore: 3.6, integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, { attackComplexity: "Low", attackVector: "Network", author: "NVD", availabilityImpact: "High", baseScore: 7.5, baseSeverity: "High", confidentialityImpact: "None", exploitabilityScore: null, id: "CVE-2019-19044", impactScore: null, integrityImpact: "None", privilegesRequired: "None", scope: "Unchanged", trust: 0.8, userInteraction: "None", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, ], severity: [ { author: "NVD", id: "CVE-2019-19044", trust: 1.8, value: "HIGH", }, { author: "CNNVD", id: "CNNVD-201911-1064", trust: 0.6, value: "HIGH", }, { author: "VULHUB", id: "VHN-151451", trust: 0.1, value: "HIGH", }, ], }, ], sources: [ { db: "VULHUB", id: "VHN-151451", }, { db: "JVNDB", id: "JVNDB-2019-011984", }, { db: "NVD", id: "CVE-2019-19044", }, { db: "CNNVD", id: "CNNVD-201911-1064", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Two memory leaks in the v3d_submit_cl_ioctl() function in drivers/gpu/drm/v3d/v3d_gem.c in the Linux kernel before 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering kcalloc() or v3d_job_init() failures, aka CID-29cd13cfd762. Linux Kernel Contains a resource exhaustion vulnerability. Vendors have confirmed this vulnerability CID-29cd13cfd762 It is released as.Service operation interruption (DoS) There is a possibility of being put into a state. =========================================================================\nUbuntu Security Notice USN-4225-1\nJanuary 07, 2020\n\nlinux, linux-aws, linux-azure, linux-azure-5.3, linux-gcp, linux-gcp-5.3,\nlinux-kvm, linux-oracle, linux-raspi2 vulnerabilities\n=========================================================================\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 19.10\n- Ubuntu 18.04 LTS\n\nSummary:\n\nSeveral security issues were fixed in the Linux kernel. A physically proximate attacker could\nuse this to cause a denial of service (system crash) or possibly execute\narbitrary code. (CVE-2019-14895, CVE-2019-14901)\n\nIt was discovered that a heap-based buffer overflow existed in the Marvell\nLibertas WLAN Driver for the Linux kernel. A physically proximate attacker\ncould use this to cause a denial of service (system crash) or possibly\nexecute arbitrary code. (CVE-2019-14896, CVE-2019-14897)\n\nIt was discovered that the Fujitsu ES network device driver for the Linux\nkernel did not properly check for errors in some situations, leading to a\nNULL pointer dereference. A local attacker could use this to cause a denial\nof service. (CVE-2019-16231)\n\nAnthony Steinhauser discovered that the Linux kernel did not properly\nperform Spectre_RSB mitigations to all processors for PowerPC architecture\nsystems in some situations. A local attacker could use this to expose\nsensitive information. (CVE-2019-18660)\n\nIt was discovered that the Broadcom V3D DRI driver in the Linux kernel did\nnot properly deallocate memory in certain error conditions. (CVE-2019-19044)\n\nIt was discovered that the Mellanox Technologies Innova driver in the Linux\nkernel did not properly deallocate memory in certain failure conditions. (CVE-2019-19045)\n\nIt was discovered that the Mellanox Technologies ConnectX driver in the\nLinux kernel did not properly deallocate memory in certain failure\nconditions. (CVE-2019-19047)\n\nIt was discovered that the Intel WiMAX 2400 driver in the Linux kernel did\nnot properly deallocate memory in certain situations. \n(CVE-2019-19051)\n\nIt was discovered that Geschwister Schneider USB CAN interface driver in\nthe Linux kernel did not properly deallocate memory in certain failure\nconditions. (CVE-2019-19052)\n\nIt was discovered that the netlink-based 802.11 configuration interface in\nthe Linux kernel did not deallocate memory in certain error conditions. (CVE-2019-19055)\n\nIt was discovered that the event tracing subsystem of the Linux kernel did\nnot properly deallocate memory in certain error conditions. A\nphysically proximate attacker could possibly use this to cause a denial of\nservice (system crash) or execute arbitrary code. (CVE-2019-19524)\n\nIt was discovered that the Microchip CAN BUS Analyzer driver in the Linux\nkernel contained a use-after-free vulnerability on device disconnect. A\nphysically proximate attacker could use this to cause a denial of service\n(system crash) or possibly execute arbitrary code. (CVE-2019-19529)\n\nIt was discovered that the PEAK-System Technik USB driver in the Linux\nkernel did not properly sanitize memory before sending it to the device. A\nphysically proximate attacker could use this to expose sensitive\ninformation (kernel memory). A local attacker could use\nthis to cause a denial of service (system crash) or possibly execute\narbitrary code. (CVE-2019-19807)\n\nIt was discovered that the DesignWare USB3 controller driver in the Linux\nkernel did not properly deallocate memory in some error conditions. (CVE-2019-18813)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 19.10:\n linux-image-5.3.0-1008-oracle 5.3.0-1008.9\n linux-image-5.3.0-1009-aws 5.3.0-1009.10\n linux-image-5.3.0-1009-azure 5.3.0-1009.10\n linux-image-5.3.0-1009-kvm 5.3.0-1009.10\n linux-image-5.3.0-1011-gcp 5.3.0-1011.12\n linux-image-5.3.0-1015-raspi2 5.3.0-1015.17\n linux-image-5.3.0-26-generic 5.3.0-26.28\n linux-image-5.3.0-26-generic-lpae 5.3.0-26.28\n linux-image-5.3.0-26-lowlatency 5.3.0-26.28\n linux-image-5.3.0-26-snapdragon 5.3.0-26.28\n linux-image-aws 5.3.0.1009.11\n linux-image-azure 5.3.0.1009.27\n linux-image-gcp 5.3.0.1011.12\n linux-image-generic 5.3.0.26.30\n linux-image-generic-lpae 5.3.0.26.30\n linux-image-gke 5.3.0.1011.12\n linux-image-kvm 5.3.0.1009.11\n linux-image-lowlatency 5.3.0.26.30\n linux-image-oracle 5.3.0.1008.9\n linux-image-raspi2 5.3.0.1015.12\n linux-image-snapdragon 5.3.0.26.30\n linux-image-virtual 5.3.0.26.30\n\nUbuntu 18.04 LTS:\n linux-image-5.3.0-1009-azure 5.3.0-1009.10~18.04.1\n linux-image-5.3.0-1010-gcp 5.3.0-1010.11~18.04.1\n linux-image-azure-edge 5.3.0.1009.9\n linux-image-gcp-edge 5.3.0.1010.10\n\nAfter a standard system update you need to reboot your computer to make\nall the necessary changes. \n\nATTENTION: Due to an unavoidable ABI change the kernel updates have\nbeen given a new version number, which requires you to recompile and\nreinstall all third party kernel modules you might have installed. \nUnless you manually uninstalled the standard kernel metapackages\n(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,\nlinux-powerpc), a standard system upgrade will automatically perform\nthis as well. \n\nReferences:\n https://usn.ubuntu.com/4225-1\n CVE-2019-14895, CVE-2019-14896, CVE-2019-14897, CVE-2019-14901,\n CVE-2019-16231, CVE-2019-18660, CVE-2019-18813, CVE-2019-19044,\n CVE-2019-19045, CVE-2019-19047, CVE-2019-19051, CVE-2019-19052,\n CVE-2019-19055, CVE-2019-19072, CVE-2019-19524, CVE-2019-19529,\n CVE-2019-19534, CVE-2019-19807\n\nPackage Information:\n https://launchpad.net/ubuntu/+source/linux/5.3.0-26.28\n https://launchpad.net/ubuntu/+source/linux-aws/5.3.0-1009.10\n https://launchpad.net/ubuntu/+source/linux-azure/5.3.0-1009.10\n https://launchpad.net/ubuntu/+source/linux-gcp/5.3.0-1011.12\n https://launchpad.net/ubuntu/+source/linux-kvm/5.3.0-1009.10\n https://launchpad.net/ubuntu/+source/linux-oracle/5.3.0-1008.9\n https://launchpad.net/ubuntu/+source/linux-raspi2/5.3.0-1015.17\n https://launchpad.net/ubuntu/+source/linux-azure-5.3/5.3.0-1009.10~18.04.1\n https://launchpad.net/ubuntu/+source/linux-gcp-5.3/5.3.0-1010.11~18.04.1\n", sources: [ { db: "NVD", id: "CVE-2019-19044", }, { db: "JVNDB", id: "JVNDB-2019-011984", }, { db: "VULHUB", id: "VHN-151451", }, { db: "PACKETSTORM", id: "155853", }, ], trust: 1.8, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2019-19044", trust: 2.6, }, { db: "JVNDB", id: "JVNDB-2019-011984", trust: 0.8, }, { db: "CNNVD", id: "CNNVD-201911-1064", trust: 0.7, }, { db: "PACKETSTORM", id: "155853", trust: 0.7, }, { db: "AUSCERT", id: "ESB-2020.0052", trust: 0.6, }, { db: "VULHUB", id: "VHN-151451", trust: 0.1, }, ], sources: [ { db: "VULHUB", id: "VHN-151451", }, { db: "JVNDB", id: "JVNDB-2019-011984", }, { db: "PACKETSTORM", id: "155853", }, { db: "NVD", id: "CVE-2019-19044", }, { db: "CNNVD", id: "CNNVD-201911-1064", }, ], }, id: "VAR-201911-1397", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "VULHUB", id: "VHN-151451", }, ], trust: 0.01, }, last_update_date: "2023-12-18T11:51:37.141000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "ChangeLog-5.3.11", trust: 0.8, url: "https://cdn.kernel.org/pub/linux/kernel/v5.x/changelog-5.3.11", }, { title: "drm/v3d: Fix memory leak in v3d_submit_cl_ioctl", trust: 0.8, url: "https://github.com/torvalds/linux/commit/29cd13cfd7624726d9e6becbae9aa419ef35af7f", }, { title: "Linux Kernel Archives", trust: 0.8, url: "http://www.kernel.org", }, { title: "Linux kernel Remediation of resource management error vulnerabilities", trust: 0.6, url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=102986", }, ], sources: [ { db: "JVNDB", id: "JVNDB-2019-011984", }, { db: "CNNVD", id: "CNNVD-201911-1064", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-401", trust: 1.1, }, { problemtype: "CWE-400", trust: 0.8, }, ], sources: [ { db: "VULHUB", id: "VHN-151451", }, { db: "JVNDB", id: "JVNDB-2019-011984", }, { db: "NVD", id: "CVE-2019-19044", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 1.7, url: "https://security.netapp.com/advisory/ntap-20191205-0001/", }, { trust: 1.7, url: "https://cdn.kernel.org/pub/linux/kernel/v5.x/changelog-5.3.11", }, { trust: 1.7, url: "https://github.com/torvalds/linux/commit/29cd13cfd7624726d9e6becbae9aa419ef35af7f", }, { trust: 1.7, url: "https://usn.ubuntu.com/4225-1/", }, { trust: 1.5, url: "https://nvd.nist.gov/vuln/detail/cve-2019-19044", }, { trust: 0.8, url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-19044", }, { trust: 0.6, url: "https://usn.ubuntu.com/4228-1/", }, { trust: 0.6, url: "https://usn.ubuntu.com/4227-1/", }, { trust: 0.6, url: "https://usn.ubuntu.com/4226-1/", }, { trust: 0.6, url: "https://vigilance.fr/vulnerability/linux-kernel-five-vulnerabilities-via-memory-leak-30910", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2020.0052/", }, { trust: 0.6, url: "https://packetstormsecurity.com/files/155853/ubuntu-security-notice-usn-4225-1.html", }, { trust: 0.1, url: "https://usn.ubuntu.com/4225-1", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2019-16231", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2019-18813", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2019-18660", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2019-19052", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-aws/5.3.0-1009.10", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-gcp-5.3/5.3.0-1010.11~18.04.1", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-azure-5.3/5.3.0-1009.10~18.04.1", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2019-19047", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2019-19045", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2019-14895", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-kvm/5.3.0-1009.10", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-gcp/5.3.0-1011.12", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux/5.3.0-26.28", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2019-19524", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2019-19807", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2019-19529", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2019-19072", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-raspi2/5.3.0-1015.17", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2019-19534", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2019-19055", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-azure/5.3.0-1009.10", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2019-19051", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-oracle/5.3.0-1008.9", }, ], sources: [ { db: "VULHUB", id: "VHN-151451", }, { db: "JVNDB", id: "JVNDB-2019-011984", }, { db: "PACKETSTORM", id: "155853", }, { db: "NVD", id: "CVE-2019-19044", }, { db: "CNNVD", id: "CNNVD-201911-1064", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "VULHUB", id: "VHN-151451", }, { db: "JVNDB", id: "JVNDB-2019-011984", }, { db: "PACKETSTORM", id: "155853", }, { db: "NVD", id: "CVE-2019-19044", }, { db: "CNNVD", id: "CNNVD-201911-1064", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2019-11-18T00:00:00", db: "VULHUB", id: "VHN-151451", }, { date: "2019-11-22T00:00:00", db: "JVNDB", id: "JVNDB-2019-011984", }, { date: "2020-01-07T16:46:28", db: "PACKETSTORM", id: "155853", }, { date: "2019-11-18T06:15:11.280000", db: "NVD", id: "CVE-2019-19044", }, { date: "2019-11-18T00:00:00", db: "CNNVD", id: "CNNVD-201911-1064", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2023-01-20T00:00:00", db: "VULHUB", id: "VHN-151451", }, { date: "2019-11-22T00:00:00", db: "JVNDB", id: "JVNDB-2019-011984", }, { date: "2023-01-20T14:35:42.983000", db: "NVD", id: "CVE-2019-19044", }, { date: "2020-08-25T00:00:00", db: "CNNVD", id: "CNNVD-201911-1064", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "remote", sources: [ { db: "CNNVD", id: "CNNVD-201911-1064", }, ], trust: 0.6, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Linux Kernel Vulnerable to resource exhaustion", sources: [ { db: "JVNDB", id: "JVNDB-2019-011984", }, ], trust: 0.8, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "resource management error", sources: [ { db: "CNNVD", id: "CNNVD-201911-1064", }, ], trust: 0.6, }, }
fkie_cve-2019-19044
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.11 | Release Notes, Vendor Advisory | |
cve@mitre.org | https://github.com/torvalds/linux/commit/29cd13cfd7624726d9e6becbae9aa419ef35af7f | Patch, Third Party Advisory | |
cve@mitre.org | https://security.netapp.com/advisory/ntap-20191205-0001/ | Third Party Advisory | |
cve@mitre.org | https://usn.ubuntu.com/4225-1/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.11 | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/torvalds/linux/commit/29cd13cfd7624726d9e6becbae9aa419ef35af7f | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20191205-0001/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/4225-1/ | Third Party Advisory |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "5DE0A98B-691B-452B-8586-6A95E92C4C98", versionEndExcluding: "5.3.11", versionStartIncluding: "5.3", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", matchCriteriaId: "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:aff_baseboard_management_controller:-:*:*:*:*:*:*:*", matchCriteriaId: "5C0ADE5D-F91D-4E0D-B6C5-3511B19665F1", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", matchCriteriaId: "5C2089EE-5D7F-47EC-8EA5-0F69790564C4", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:data_availability_services:-:*:*:*:*:*:*:*", matchCriteriaId: "0EF46487-B64A-454E-AECC-D74B83170ACD", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.0:*:*:*:*:*:*:*", matchCriteriaId: "8AFF1109-26F3-43A5-A4CB-0F169FDBC0DE", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.0.0:*:*:*:*:*:*:*", matchCriteriaId: "5AF71C49-ADEF-4EE2-802C-6159ADD51355", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.20:*:*:*:*:*:*:*", matchCriteriaId: "B3BC6E59-2134-4A28-AAD2-77C8AE236BCF", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.25:*:*:*:*:*:*:*", matchCriteriaId: "24377899-5389-4BDC-AC82-0E4186F4DE53", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.30:*:*:*:*:*:*:*", matchCriteriaId: "23FE83DE-AE7C-4313-88E3-886110C31302", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.30.5r3:*:*:*:*:*:*:*", matchCriteriaId: "490B327B-AC20-419B-BB76-8AB6971304BB", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.40:*:*:*:*:*:*:*", matchCriteriaId: "8DCE2754-7A9E-4B3B-91D1-DCF90C1BABE5", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.40.3r2:*:*:*:*:*:*:*", matchCriteriaId: "6CA74E8B-51E2-4A7C-8A98-0583D31134A6", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.40.5:*:*:*:*:*:*:*", matchCriteriaId: "7B64AB37-A1D9-4163-A51B-4C780361F1F1", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.50.1:*:*:*:*:*:*:*", matchCriteriaId: "7BE9C9D7-9CED-4184-A190-1024A6FB8C82", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.50.2:-:*:*:*:*:*:*", matchCriteriaId: "B73D4C3C-A511-4E14-B19F-91F561ACB1B8", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.50.2:p1:*:*:*:*:*:*", matchCriteriaId: "0C47D72C-9B6B-4E52-AF0E-56AD58E4A930", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.60:*:*:*:*:*:*:*", matchCriteriaId: "039C3790-5AA2-4895-AEAE-CC84A71DB907", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.60.0:*:*:*:*:*:*:*", matchCriteriaId: "B4592238-D1F2-43D6-9BAB-2F63ECF9C965", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.60.1:*:*:*:*:*:*:*", matchCriteriaId: "0BA78068-80E9-4E49-9056-88EAB7E3682C", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.60.3:*:*:*:*:*:*:*", matchCriteriaId: "092F366C-E8B0-4BE5-B106-0B7A73B08D34", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.70.1:*:*:*:*:*:*:*", matchCriteriaId: "E7992E92-B159-4810-B895-01A9B944058A", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.70.2:*:*:*:*:*:*:*", matchCriteriaId: "5BDD7AAB-2BF3-4E8C-BEE2-5217E2926C11", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:fas\\/aff_baseboard_management_controller:-:*:*:*:*:*:*:*", matchCriteriaId: "66EEA3CA-8CC7-4F0B-8204-6132D4114873", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:hci_baseboard_management_controller:h610s:*:*:*:*:*:*:*", matchCriteriaId: "DE7C6010-F736-4BDA-9E3B-C4370BBFA149", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:solidfire\\,_enterprise_sds_\\&_hci_storage_node:-:*:*:*:*:*:*:*", matchCriteriaId: "DAA3919C-B2B1-4CB5-BA76-7A079AAFFC52", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:solidfire_\\&_hci_management_node:-:*:*:*:*:*:*:*", matchCriteriaId: "D6D700C5-F67F-4FFB-BE69-D524592A3D2E", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", matchCriteriaId: "E94F7F59-1785-493F-91A7-5F5EA5E87E4D", vulnerable: true, }, { criteria: "cpe:2.3:o:broadcom:brocade_fabric_operating_system_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B2748912-FC54-47F6-8C0C-B96784765B8E", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netapp:hci_compute_node_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F921BC85-568E-4B69-A3CD-CF75C76672F1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*", matchCriteriaId: "AD7447BC-F315-4298-A822-549942FC118B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netapp:solidfire_baseboard_management_controller_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "FB9B8171-F6CA-427D-81E0-6536D3BBFA8D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netapp:solidfire_baseboard_management_controller:-:*:*:*:*:*:*:*", matchCriteriaId: "090AA6F4-4404-4E26-82AB-C3A22636F276", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", matchCriteriaId: "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", matchCriteriaId: "A31C8344-3E02-4EB8-8BD8-4C84B7959624", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Two memory leaks in the v3d_submit_cl_ioctl() function in drivers/gpu/drm/v3d/v3d_gem.c in the Linux kernel before 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering kcalloc() or v3d_job_init() failures, aka CID-29cd13cfd762.", }, { lang: "es", value: "Dos pérdidas de memoria en la función v3d_submit_cl_ioctl() en el archivo drivers/gpu/drm/v3d/v3d_gem.c en el kernel de Linux versiones anteriores a la versión 5.3.11, permiten a atacantes causar una denegación de servicio (consumo de memoria) al desencadenar fallos de la función kcalloc() o v3d_job_init(), también se conoce como CID-29cd13cfd762.", }, ], id: "CVE-2019-19044", lastModified: "2024-11-21T04:34:03.447", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.8, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-11-18T06:15:11.280", references: [ { source: "cve@mitre.org", tags: [ "Release Notes", "Vendor Advisory", ], url: "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.11", }, { source: "cve@mitre.org", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/torvalds/linux/commit/29cd13cfd7624726d9e6becbae9aa419ef35af7f", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20191205-0001/", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/4225-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", "Vendor Advisory", ], url: "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.11", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/torvalds/linux/commit/29cd13cfd7624726d9e6becbae9aa419ef35af7f", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20191205-0001/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/4225-1/", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-401", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Log in or create an account to share your comment.
This schema specifies the format of a comment related to a security advisory.
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.