{"id":"CVE-2019-19065","details":"A memory leak in the sdma_init() function in drivers/infiniband/hw/hfi1/sdma.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering rhashtable_init() failures, aka CID-34b3be18a04e. NOTE: This has been disputed as not a vulnerability because \"rhashtable_init() can only fail if it is passed invalid values in the second parameter's struct, but when invoked from sdma_init() that is a pointer to a static const struct, so an attacker could only trigger failure if they could corrupt kernel memory (in which case a small memory leak is not a significant problem).","modified":"2026-03-15T14:34:14.684074Z","published":"2019-11-18T06:15:12.670Z","related":["SUSE-SU-2019:3200-1","SUSE-SU-2019:3289-1","SUSE-SU-2019:3316-1","SUSE-SU-2019:3317-1","SUSE-SU-2019:3371-1","SUSE-SU-2019:3372-1","SUSE-SU-2019:3379-1","SUSE-SU-2019:3381-1","SUSE-SU-2020:0093-1","SUSE-SU-2020:0599-1","SUSE-SU-2020:0613-1","openSUSE-SU-2019:2675-1"],"references":[{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20191205-0001/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4208-1/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4210-1/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4226-1/"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html"},{"type":"ADVISORY","url":"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.9"},{"type":"FIX","url":"https://github.com/torvalds/linux/commit/34b3be18a04ecdc610aae4c48e5d1b799d8689f6"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-19065.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"5.3.9"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.04"}]},{"events":[{"introduced":"0"},{"last_affected":"19.04"}]},{"events":[{"introduced":"0"},{"last_affected":"19.10"}]},{"events":[{"introduced":"0"},{"last_affected":"15.1"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}