Vulnerability Name: | CVE-2019-17075 (CCN-168363) | ||||||||||||||||
Assigned: | 2019-10-01 | ||||||||||||||||
Published: | 2019-10-01 | ||||||||||||||||
Updated: | 2021-06-14 | ||||||||||||||||
Summary: | An issue was discovered in write_tpt_entry in drivers/infiniband/hw/cxgb4/mem.c in the Linux kernel through 5.3.2. The cxgb4 driver is directly calling dma_map_single (a DMA function) from a stack variable. This could allow an attacker to trigger a Denial of Service, exploitable if this driver is used on an architecture for which this stack/DMA interaction has security relevance. | ||||||||||||||||
CVSS v3 Severity: | 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) 6.6 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:U/RC:R)
3.5 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:U/RC:R)
| ||||||||||||||||
CVSS v2 Severity: | 7.1 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:C)
| ||||||||||||||||
Vulnerability Type: | CWE-noinfo | ||||||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2019-17075 Source: MISC Type: UNKNOWN http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html Source: XF Type: UNKNOWN linux-kernel-cve201917075-dos(168363) Source: MLIST Type: UNKNOWN [debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update Source: MISC Type: Exploit, Patch, Vendor Advisory https://lore.kernel.org/lkml/20191001165611.GA3542072@kroah.com Source: CCN Type: Lore Web site [PATCH v2] cxgb4: do not dma memory off of the stack Source: BUGTRAQ Type: UNKNOWN 20191108 [slackware-security] Slackware 14.2 kernel (SSA:2019-311-01) Source: UBUNTU Type: UNKNOWN USN-4208-1 Source: UBUNTU Type: UNKNOWN USN-4210-1 Source: UBUNTU Type: UNKNOWN USN-4211-1 Source: UBUNTU Type: UNKNOWN USN-4211-2 Source: UBUNTU Type: UNKNOWN USN-4226-1 Source: CCN Type: IBM Security Bulletin 6116992 (Spectrum Protect Plus) Multiple vulnerabilities in Linux Kernel affect IBM Spectrum Protect Plus Source: CCN Type: Linux Kernel Web site The Linux Kernel Archives Source: MISC Type: UNKNOWN https://www.oracle.com/security-alerts/cpuApr2021.html | ||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||
Oval Definitions | |||||||||||||||||
| |||||||||||||||||
BACK |