Bug 1743526 (CVE-2019-15090) - CVE-2019-15090 kernel: An out-of-bounds read in drivers/scsi/qedi/qedi_dbg.c leading to crash or information disclosure
Summary: CVE-2019-15090 kernel: An out-of-bounds read in drivers/scsi/qedi/qedi_dbg.c ...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2019-15090
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1724577 1724588 1808265 1808268
Blocks: 1743527
TreeView+ depends on / blocked
 
Reported: 2019-08-20 07:49 UTC by Marian Rehak
Modified: 2023-09-07 20:25 UTC (History)
48 users (show)

Fixed In Version: kernel 5.1.12
Doc Type: If docs needed, set a value
Doc Text:
An out-of-bounds (OOB) memory access flaw was found in the Qlogic ISCSI module in the Linux kernel's qedi_dbg_* family of functions in drivers/scsi/qedi/qedi_dbg.c. Here a local attacker with a special user privilege account (or a root) can cause an out-of-bound memory access leading to a system crash or a leak of internal kernel information.
Clone Of:
Environment:
Last Closed: 2020-04-28 16:33:55 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHBA-2020:2052 0 None None None 2020-05-11 12:53:45 UTC
Red Hat Product Errata RHBA-2020:2626 0 None None None 2020-06-19 01:49:45 UTC
Red Hat Product Errata RHSA-2020:1567 0 None None None 2020-04-28 15:24:58 UTC
Red Hat Product Errata RHSA-2020:1769 0 None None None 2020-04-28 15:51:20 UTC

Description Marian Rehak 2019-08-20 07:49:30 UTC
An out of bounds (OOB) memory access flaw was found in the Linux kernel's qedi_dbg_* family of functions in drivers/scsi/qedi/qedi_dbg.c in Qlogic ISCSI Subsystem.  This could allow a local attacker with a special user privilege account (or a root) to crash the system or leak kernel internal information.


Upstream Fix:

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c09581a52765a85f19fc35340127396d5e3379cc

Comment 2 Rohit Keshri 2020-02-13 08:44:24 UTC
Mitigation:

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Comment 3 Product Security DevOps Team 2020-02-13 14:09:36 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2019-15090

Comment 6 errata-xmlrpc 2020-04-28 15:24:55 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2020:1567 https://access.redhat.com/errata/RHSA-2020:1567

Comment 7 errata-xmlrpc 2020-04-28 15:51:18 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2020:1769 https://access.redhat.com/errata/RHSA-2020:1769

Comment 8 Product Security DevOps Team 2020-04-28 16:33:55 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2019-15090


Note You need to log in before you can comment on or make changes to this bug.