← Retour aux CVEs
CVE-2019-15916
HIGH7.5
Description
An issue was discovered in the Linux kernel before 5.0.1. There is a memory leak in register_queue_kobjects() in net/core/net-sysfs.c, which will cause denial of service.
Details CVE
Score CVSS v3.17.5
SeveriteHIGH
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisNONE
Interaction utilisateurNONE
Publie9/4/2019
Derniere modification11/21/2024
Sourcenvd
Observations honeypot0
Produits affectes
linux:linux_kernel
Faiblesses (CWE)
CWE-401
References
https://access.redhat.com/errata/RHSA-2019:3309(cve@mitre.org)
https://access.redhat.com/errata/RHSA-2019:3517(cve@mitre.org)
https://access.redhat.com/errata/RHSA-2020:0740(cve@mitre.org)
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.1(cve@mitre.org)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=895a5e96dbd6386c8e78e5b78e067dcc67b7f0ab(cve@mitre.org)
https://security.netapp.com/advisory/ntap-20191004-0001/(cve@mitre.org)
https://support.f5.com/csp/article/K57418558?utm_source=f5support&%3Butm_medium=RSS(cve@mitre.org)
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:3309(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:3517(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2020:0740(af854a3a-2127-422b-91ae-364da2661108)
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.1(af854a3a-2127-422b-91ae-364da2661108)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=895a5e96dbd6386c8e78e5b78e067dcc67b7f0ab(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20191004-0001/(af854a3a-2127-422b-91ae-364da2661108)
https://support.f5.com/csp/article/K57418558?utm_source=f5support&%3Butm_medium=RSS(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.