Bug 1775000 (CVE-2019-19065) - CVE-2019-19065 kernel: A memory leak in the sdma_init() function in drivers/infiniband/hw/hfi1/sdma.c allows for a DoS
Summary: CVE-2019-19065 kernel: A memory leak in the sdma_init() function in drivers/i...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2019-19065
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1719676 1775001 1829529 1829530 1829531 1829532
Blocks: 1775003
TreeView+ depends on / blocked
 
Reported: 2019-11-21 11:16 UTC by Marian Rehak
Modified: 2021-10-25 22:14 UTC (History)
42 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2021-10-25 22:14:10 UTC
Embargoed:


Attachments (Terms of Use)

Description Marian Rehak 2019-11-21 11:16:24 UTC
A memory leak in the sdma_init() function in drivers/infiniband/hw/hfi1/sdma.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering rhashtable_init() failures.

Upstream Issue:

https://github.com/torvalds/linux/commit/34b3be18a04ecdc610aae4c48e5d1b799d8689f6

Comment 1 Marian Rehak 2019-11-21 11:16:43 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 1775001]

Comment 2 Justin M. Forbes 2019-11-21 16:44:20 UTC
This was fixed for Fedora with the 5.3.9 stable kernel update.

Comment 5 Petr Matousek 2020-04-29 17:49:03 UTC
Statement:

This issue is rated as having Low impact because of the preconditions needed to trigger the resource cleanup code path (system-wide out-of-memory condition).

Comment 6 Petr Matousek 2020-04-29 17:49:06 UTC
Mitigation:

In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module hfi1. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 .


Note You need to log in before you can comment on or make changes to this bug.