CVE-2019-19922
kernel/sched/fair.c in the Linux kernel before 5.3.9, when cpu.cfs_quota_us is used (e.g., with Kubernetes), allows attackers to cause a denial of service against non-cpu-bound applications by generating a workload that triggers unwanted slice expiration, aka CID-de53fd7aedb1. (In other words, although this slice expiration would typically be seen with benign workloads, it is possible that an attacker could calculate how many stray requests are required to force an entire Kubernetes cluster into a low-performance state caused by slice expiration, and ensure that a DDoS attack sent that number of stray requests. An attack does not affect the stability of the kernel; it only causes mismanagement of application execution.)
Published
2019-12-22T20:15:10.823
Last Modified
2024-11-21T04:35:40.277
Status
Modified
Source
[email protected]
Severity
CVSSv3.1: 5.5 (MEDIUM)
CVSSv2 Vector
AV:L/AC:L/Au:N/C:N/I:N/A:P
- Access Vector: LOCAL
- Access Complexity: LOW
- Authentication: NONE
- Confidentiality Impact: NONE
- Integrity Impact: NONE
- Availability Impact: PARTIAL
Exploitability Score
3.9
Impact Score
2.9
Weaknesses
Affected Vendors & Products
References
-
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.9
Mailing List, Patch, Vendor Advisory
([email protected])
-
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=de53fd7aedb100f03e5d2231cfce0e4993282425
Mailing List, Patch, Vendor Advisory
([email protected])
-
https://github.com/kubernetes/kubernetes/issues/67577
Issue Tracking, Patch, Third Party Advisory
([email protected])
-
https://github.com/torvalds/linux/commit/de53fd7aedb100f03e5d2231cfce0e4993282425
Patch, Third Party Advisory
([email protected])
-
https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
Mailing List, Third Party Advisory
([email protected])
-
https://relistan.com/the-kernel-may-be-slowing-down-your-app
Exploit, Third Party Advisory
([email protected])
-
https://security.netapp.com/advisory/ntap-20200204-0002/
Third Party Advisory
([email protected])
-
https://usn.ubuntu.com/4226-1/
Third Party Advisory
([email protected])
-
https://www.oracle.com/security-alerts/cpuApr2021.html
Patch, Third Party Advisory
([email protected])
-
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.9
Mailing List, Patch, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=de53fd7aedb100f03e5d2231cfce0e4993282425
Mailing List, Patch, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://github.com/kubernetes/kubernetes/issues/67577
Issue Tracking, Patch, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://github.com/torvalds/linux/commit/de53fd7aedb100f03e5d2231cfce0e4993282425
Patch, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://relistan.com/the-kernel-may-be-slowing-down-your-app
Exploit, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://security.netapp.com/advisory/ntap-20200204-0002/
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://usn.ubuntu.com/4226-1/
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://www.oracle.com/security-alerts/cpuApr2021.html
Patch, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)