#VU24438 Memory leak in Linux kernel


Published: 2020-01-21

Vulnerability identifier: #VU24438

Vulnerability risk: Low

CVSSv3.1: 5.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-19922

CWE-ID: CWE-401

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description
The vulnerability allows a local user to perform DoS attack on the target system.

The vulnerability exists due memory leak in "kernel/sched/fair.c" when "cpu.cfs_quota_us" is used (e.g., with Kubernetes). A local user can cause a denial of service against non-cpu-bound applications by generating a workload that triggers unwanted slice expiration.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Linux kernel: 5.3 - 5.3.8


External links
http://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.9
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=de53fd7aedb100f03e5d2231cfce0e4993282425
http://github.com/kubernetes/kubernetes/issues/67577
http://github.com/torvalds/linux/commit/de53fd7aedb100f03e5d2231cfce0e4993282425
http://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
http://relistan.com/the-kernel-may-be-slowing-down-your-app
http://usn.ubuntu.com/4226-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability