A vulnerability was found in the Linux kernels driver for Siano Mobile Silicon, MDTV receiver. An attacker with physical access with a crafted USB device can exploit assumptions made in the driver to create a NULL pointer dereference. Reference: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=31e0456de5be379b10fea0fa94a681057114a96e https://syzkaller.appspot.com/bug?id=4a5d7c8c2b6dbedb5b7218c6d7e8666bd2387517
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1745531]
This was fixed for Fedora with the 5.1.8 stable kernel update.
Mitigation: As the smsusb module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions: # echo "install smsusb /bin/true" >> /etc/modprobe.d/disable-smsusb.conf The system will need to be restarted if the module are already loaded. In most circumstances, the smsusb kernel modules will be unable to be unloaded while the adapter is in use. If the system requires this module to work correctly, this mitigation may not be suitable. If you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services."