Bug 1760490 (CVE-2019-16229)
Summary: | CVE-2019-16229 kernel: null pointer dereference in drivers/gpu/drm/amd/amdkfd/kfd_interrupt.c | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Guilherme de Almeida Suckevicz <gsuckevi> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | acaringi, airlied, bdettelb, bhu, blc, brdeoliv, bskeggs, dhoward, dvlasenk, esammons, fhrbata, hdegoede, hkrzesin, iboverma, ichavero, itamar, jarodwilson, jeremy, jforbes, jlelli, john.j5live, jonathan, josef, jross, jshortt, jstancek, jwboyer, kernel-maint, kernel-mgr, lgoncalv, linville, masami256, mchehab, mcressma, mjg59, mlangsdo, nmurray, rkeshri, rt-maint, rvrbovsk, steved, williams |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: |
A NULL pointer dereference flaw was found in kfd_interrupt_init in drivers/gpu/drm/amd/amdkfd/kfd_interrupt.c in AMD GPU driver. Here a call to alloc_workqueue return was not validated and can cause a denial of service at the time of failure. This could allow an attacker to crash the system or leak kernel internal information.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2021-10-25 09:55:51 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1760492, 1811613, 1811614, 1811615, 1811616, 1811617 | ||
Bug Blocks: | 1760493 |
Description
Guilherme de Almeida Suckevicz
2019-10-10 16:37:51 UTC
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1760492] Mitigation: Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability. This is fixed in Fedora with the 5.4.7 stable kernel updates. |