Bug 1775097 (CVE-2019-19056) - CVE-2019-19056 kernel: A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function in drivers/net/wireless/marvell/mwifiex/pcie.c allows to cause DoS
Summary: CVE-2019-19056 kernel: A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() f...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2019-19056
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1775115 1829227 1829228 1829229 1829230 1829231
Blocks: 1775108
TreeView+ depends on / blocked
 
Reported: 2019-11-21 12:10 UTC by msiddiqu
Modified: 2023-09-07 21:03 UTC (History)
45 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in the way the mwifiex PCIE driver in the Linux kernel handled resource cleanup on a DMA mapping error. This flaw allows an attacker able to trigger the DMA mapping error to crash the system.
Clone Of:
Environment:
Last Closed: 2020-11-04 02:23:26 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2020:4431 0 None None None 2020-11-04 00:49:50 UTC
Red Hat Product Errata RHSA-2020:4609 0 None None None 2020-11-04 02:21:43 UTC

Description msiddiqu 2019-11-21 12:10:30 UTC
A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function indrivers/net/wireless/marvell/mwifiex/pcie.c allows attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures

Upstream commit:

https://github.com/torvalds/linux/commit/db8fd2cde93227e566a412cf53173ffa227998bc

Comment 1 msiddiqu 2019-11-21 12:19:38 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 1775115]

Comment 5 Petr Matousek 2020-04-29 09:01:48 UTC
Mitigation:

In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module mwifiex_pcie. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 .

Comment 6 Petr Matousek 2020-04-29 09:03:01 UTC
Statement:

This issue is rated as having Low impact because of the preconditions needed to trigger the resource cleanup code path (DMA mapping error).

Comment 8 errata-xmlrpc 2020-11-04 00:49:47 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2020:4431 https://access.redhat.com/errata/RHSA-2020:4431

Comment 9 errata-xmlrpc 2020-11-04 02:21:40 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2020:4609 https://access.redhat.com/errata/RHSA-2020:4609

Comment 10 Product Security DevOps Team 2020-11-04 02:23:26 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2019-19056


Note You need to log in before you can comment on or make changes to this bug.