← Volver a CVEs
CVE-2019-15916
HIGH7.5
Descripcion
An issue was discovered in the Linux kernel before 5.0.1. There is a memory leak in register_queue_kobjects() in net/core/net-sysfs.c, which will cause denial of service.
Detalles CVE
Puntuacion CVSS v3.17.5
SeveridadHIGH
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado9/4/2019
Ultima modificacion11/21/2024
Fuentenvd
Avistamientos honeypot0
Productos afectados
linux:linux_kernel
Debilidades (CWE)
CWE-401
Referencias
https://access.redhat.com/errata/RHSA-2019:3309(cve@mitre.org)
https://access.redhat.com/errata/RHSA-2019:3517(cve@mitre.org)
https://access.redhat.com/errata/RHSA-2020:0740(cve@mitre.org)
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.1(cve@mitre.org)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=895a5e96dbd6386c8e78e5b78e067dcc67b7f0ab(cve@mitre.org)
https://security.netapp.com/advisory/ntap-20191004-0001/(cve@mitre.org)
https://support.f5.com/csp/article/K57418558?utm_source=f5support&%3Butm_medium=RSS(cve@mitre.org)
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:3309(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:3517(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2020:0740(af854a3a-2127-422b-91ae-364da2661108)
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.1(af854a3a-2127-422b-91ae-364da2661108)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=895a5e96dbd6386c8e78e5b78e067dcc67b7f0ab(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20191004-0001/(af854a3a-2127-422b-91ae-364da2661108)
https://support.f5.com/csp/article/K57418558?utm_source=f5support&%3Butm_medium=RSS(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.