CVE-2019-8980

A memory leak in the kernel_read_file function in fs/exec.c in the Linux kernel through 4.20.11 allows attackers to cause a denial of service (memory consumption) by triggering vfs_read failures.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.1:rc1:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

History

21 Nov 2024, 04:50

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00052.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00052.html - Mailing List, Third Party Advisory
References () http://www.securityfocus.com/bid/107120 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/107120 - Third Party Advisory, VDB Entry
References () https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html - Mailing List, Third Party Advisory
References () https://support.f5.com/csp/article/K56480726 - Third Party Advisory () https://support.f5.com/csp/article/K56480726 - Third Party Advisory
References () https://usn.ubuntu.com/3930-1/ - Third Party Advisory () https://usn.ubuntu.com/3930-1/ - Third Party Advisory
References () https://usn.ubuntu.com/3930-2/ - Third Party Advisory () https://usn.ubuntu.com/3930-2/ - Third Party Advisory
References () https://usn.ubuntu.com/3931-1/ - Third Party Advisory () https://usn.ubuntu.com/3931-1/ - Third Party Advisory
References () https://usn.ubuntu.com/3931-2/ - Third Party Advisory () https://usn.ubuntu.com/3931-2/ - Third Party Advisory
References () https://www.mail-archive.com/linux-kernel%40vger.kernel.org/msg1935698.html - () https://www.mail-archive.com/linux-kernel%40vger.kernel.org/msg1935698.html -
References () https://www.mail-archive.com/linux-kernel%40vger.kernel.org/msg1935705.html - () https://www.mail-archive.com/linux-kernel%40vger.kernel.org/msg1935705.html -

07 Nov 2023, 03:13

Type Values Removed Values Added
References
  • {'url': 'https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg1935698.html', 'name': 'https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg1935698.html', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory'], 'refsource': 'MISC'}
  • {'url': 'https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg1935705.html', 'name': 'https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg1935705.html', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory'], 'refsource': 'MISC'}
  • () https://www.mail-archive.com/linux-kernel%40vger.kernel.org/msg1935698.html -
  • () https://www.mail-archive.com/linux-kernel%40vger.kernel.org/msg1935705.html -

Information

Published : 2019-02-21 05:29

Updated : 2024-11-21 04:50


NVD link : CVE-2019-8980

Mitre link : CVE-2019-8980

CVE.ORG link : CVE-2019-8980


JSON object : View

Products Affected

canonical

  • ubuntu_linux

linux

  • linux_kernel

debian

  • debian_linux

opensuse

  • leap
CWE
CWE-401

Missing Release of Memory after Effective Lifetime