First published: Tue Oct 01 2019(Updated: )
An issue was discovered in write_tpt_entry in drivers/infiniband/hw/cxgb4/mem.c in the Linux kernel through 5.3.2. The cxgb4 driver is directly calling dma_map_single (a DMA function) from a stack variable. This could allow an attacker to trigger a Denial of Service, exploitable if this driver is used on an architecture for which this stack/DMA interaction has security relevance.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.15-1 | |
Linux kernel | >=2.6.35<4.4.198 | |
Linux kernel | >=4.5.0<4.9.198 | |
Linux kernel | >=4.10<4.14.151 | |
Linux kernel | >=4.15<4.19.81 | |
Linux kernel | >=4.20<5.3.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-17075 has been classified with a high severity due to its potential to trigger a Denial of Service.
To fix CVE-2019-17075, upgrade to a patched version of the Linux kernel, such as 5.10.223-1 or later.
CVE-2019-17075 affects Linux kernel versions from 2.6.35 up to 5.3.2, specifically including various sub-versions.
An attacker exploiting CVE-2019-17075 could cause a Denial of Service, impacting system availability.
Yes, CVE-2019-17075 specifically involves the cxgb4 driver in the Linux kernel's handling of DMA functions.