Vulnerability Name: | CVE-2019-12379 (CCN-161702) | ||||||||||||||||||||
Assigned: | 2019-05-24 | ||||||||||||||||||||
Published: | 2019-05-24 | ||||||||||||||||||||
Updated: | 2020-08-24 | ||||||||||||||||||||
Summary: | ** DISPUTED ** An issue was discovered in con_insert_unipair in drivers/tty/vt/consolemap.c in the Linux kernel through 5.1.5. There is a memory leak in a certain case of an ENOMEM outcome of kmalloc. Note: This id is disputed as not being an issue. | ||||||||||||||||||||
CVSS v3 Severity: | 5.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) 4.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
5.4 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
| ||||||||||||||||||||
CVSS v2 Severity: | 4.9 Medium (CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C)
| ||||||||||||||||||||
Vulnerability Type: | CWE-401 | ||||||||||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2019-12379 Source: BID Type: Third Party Advisory, VDB Entry 108478 Source: XF Type: UNKNOWN linux-kernel-cve201912379-dos(161702) Source: CCN Type: Linux Kernel GIT Repository consolemap: Fix a memory leaking bug in drivers/tty/vt/consolemap.c Source: MISC Type: Mailing List, Patch, Vendor Advisory https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/tty.git/commit/?h=tty-next&id=84ecc2f6eb1cb12e6d44818f94fa49b50f06e6ac Source: MISC Type: UNKNOWN https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/tty.git/commit/?h=tty-testing&id=15b3cd8ef46ad1b100e0d3c7e38774f330726820 Source: FEDORA Type: UNKNOWN FEDORA-2019-f40bd7826f Source: FEDORA Type: UNKNOWN FEDORA-2019-7ec378191e Source: CONFIRM Type: UNKNOWN https://security.netapp.com/advisory/ntap-20190710-0002/ | ||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||
| |||||||||||||||||||||
BACK |