Bug 1705498 (CVE-2019-11486)
Summary: | CVE-2019-11486 kernel: multiple race conditions in Siemens R3964 line discipline driver in drivers/tty/n_r3964.c leading to denial of service | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | msiddiqu |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED WONTFIX | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | acaringi, airlied, bhu, blc, brdeoliv, bskeggs, dbaker, dhoward, dvlasenk, esammons, fhrbata, hdegoede, hkrzesin, iboverma, ichavero, itamar, jarodwilson, jeremy, jforbes, jglisse, jkacur, john.j5live, jonathan, josef, jross, jstancek, jwboyer, kernel-maint, kernel-mgr, labbott, lgoncalv, linville, matt, mchehab, mcressma, mjg59, mlangsdo, nmurray, plougher, rt-maint, rvrbovsk, steved, williams, wmealing |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | kernel 5.0.8 | Doc Type: | If docs needed, set a value |
Doc Text: |
A flaw was found in the Linux kernel's Siemens r3964 adapter driver. The flaw allows an attacker, with a local account and an ability to open the serial port of a Siemens r3964 adapter, may be able to abuse this race condition for memory corruption and possibly privilege escalation.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2019-05-31 06:19:46 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1705499 | ||
Bug Blocks: | 1705500 |
Description
msiddiqu
2019-05-02 12:15:13 UTC
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1705499] This was fixed for Fedora with the 5.0.8 stable kernel updates. The fix proposed by upstream is not actually fixing the problem, instead they are attempting to mask out the ability to build the code with the buggy implementation. The code with the race condition still exists in the repository, and likely other CVE's may come about if/when this driver gets fixed. Statement: This task is marked as moderate as there is likely a chance for memory corruption, but this hardware is uncommon, it is unlikely that most systems have this hardware. |