Bug 1774988 (CVE-2019-19046) - CVE-2019-19046 kernel: Denial Of Service in the __ipmi_bmc_register() function in drivers/char/ipmi/ipmi_msghandler.c
Summary: CVE-2019-19046 kernel: Denial Of Service in the __ipmi_bmc_register() functio...
Keywords:
Status: POST
Alias: CVE-2019-19046
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Tony Camuso
QA Contact:
URL:
Whiteboard:
Depends On: 1812836 1812837 1812839 1812840 1812922 1774989 1812838
Blocks: 1775026
TreeView+ depends on / blocked
 
Reported: 2019-11-21 11:08 UTC by Dhananjay Arunesh
Modified: 2020-03-26 15:32 UTC (History)
54 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A memory leak problem was found in __ipmi_bmc_register in drivers/char/ipmi/ipmi_msghandler.c in Intelligent Platform Management Interface (IPMI) which is used for incoming and outgoing message routing purpose. This flaw may allow an attacker with minimal privilege to cause a denial of service by triggering ida_simple_get() failure.
Clone Of:
Environment:
Last Closed:


Attachments (Terms of Use)

Description Dhananjay Arunesh 2019-11-21 11:08:50 UTC
A memory leak problem was found in __ipmi_bmc_register in drivers/char/ipmi/ipmi_msghandler.c in Intelligent Platform Management Interface (IPMI) which is used for incoming and outgoing message routing. This flaw may allow an attacker with minimal privilege to cause a denial of service by triggering ida_simple_get() failure.


Reference:
https://bugzilla.suse.com/show_bug.cgi?id=1157304
https://github.com/torvalds/linux/commit/4aa7afb0ee20a97fbf0c5bab3df028d5fb85fdab

Comment 1 Dhananjay Arunesh 2019-11-21 11:09:37 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 1774989]

Comment 2 Rohit Keshri 2020-03-12 10:17:35 UTC
Mitigation:

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.


Note You need to log in before you can comment on or make changes to this bug.