{ "id": "CVE-2019-16230", "sourceIdentifier": "cve@mitre.org", "published": "2019-09-11T16:15:11.130", "lastModified": "2024-11-21T04:30:19.707", "vulnStatus": "Modified", "cveTags": [ { "sourceIdentifier": "cve@mitre.org", "tags": [ "disputed" ] } ], "descriptions": [ { "lang": "en", "value": "drivers/gpu/drm/radeon/radeon_display.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference. NOTE: A third-party software maintainer states that the work queue allocation is happening during device initialization, which for a graphics card occurs during boot. It is not attacker controllable and OOM at that time is highly unlikely" }, { "lang": "es", "value": "** EN DISPUTA** drivers / gpu / drm / radeon / radeon_display.c en el kernel de Linux 5.2.14 no comprueba el valor de retorno alloc_workqueue, lo que lleva a una desreferencia de puntero NULL. NOTA: Un responsable de mantenimiento de software de terceros declara que la asignaci\u00f3n de la cola de trabajo ocurre durante la inicializaci\u00f3n del dispositivo, lo que ocurre para una tarjeta gr\u00e1fica durante el arranque. No es controlable por el atacante y OOM en ese momento es altamente improbable." } ], "metrics": { "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "baseScore": 4.7, "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.0, "impactScore": 3.6 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:C", "baseScore": 4.7, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, "impactScore": 6.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-476" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:5.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "C324614A-D986-40EF-A933-4CD401A10B30" } ] } ] } ], "references": [ { "url": "https://bugzilla.suse.com/show_bug.cgi?id=1150468", "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ] }, { "url": "https://lkml.org/lkml/2019/9/9/487", "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ] }, { "url": "https://security.netapp.com/advisory/ntap-20191004-0001/", "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ] }, { "url": "https://bugzilla.suse.com/show_bug.cgi?id=1150468", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ] }, { "url": "https://lkml.org/lkml/2019/9/9/487", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ] }, { "url": "https://security.netapp.com/advisory/ntap-20191004-0001/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ] } ] }