Bug 1759052 (CVE-2019-15925) - CVE-2019-15925 kernel: out-of-bounds access in function hclge_tm_schd_mode_vnet_base_cfg
Summary: CVE-2019-15925 kernel: out-of-bounds access in function hclge_tm_schd_mode_vn...
Alias: CVE-2019-15925
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
Depends On: 1759053 Engineering1809057 Engineering1809058 Engineering1809059
Blocks: Embargoed1759055
TreeView+ depends on / blocked
Reported: 2019-10-07 10:12 UTC by Dhananjay Arunesh
Modified: 2021-02-16 21:18 UTC (History)
43 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
An out-of-bounds access flaw was found in the hclge_shaper_para_calc driver in the Linux kernel. Access to an array with an index higher than its maximum index will lead to an out-of-bounds access vulnerability. This could affect both data confidentiality and integrity as well as system availability.
Clone Of:
Last Closed: 2020-11-04 02:21:43 UTC

Attachments (Terms of Use)

System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2020:4431 0 None None None 2020-11-04 00:49:22 UTC
Red Hat Product Errata RHSA-2020:4609 0 None None None 2020-11-04 02:21:04 UTC

Description Dhananjay Arunesh 2019-10-07 10:12:19 UTC
An issue was discovered in the Linux kernel. An out of bounds access exists in the function hclge_tm_schd_mode_vnet_base_cfg in the file drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_tm.c.


Comment 1 Dhananjay Arunesh 2019-10-07 10:12:51 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 1759053]

Comment 2 Justin M. Forbes 2019-10-07 14:21:22 UTC
This was fixed for Fedora with the 5.2.3 stable updates.

Comment 6 Eric Christensen 2020-03-12 15:59:08 UTC

Blacklisting the affected HCLGE driver module until a patch is available can be done using the blacklist mechanism. This will ensure the driver is not loaded at boot time.  For instructions on how to black list a kernel module, please read: https://access.redhat.com/solutions/41278.

Comment 7 errata-xmlrpc 2020-11-04 00:49:18 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2020:4431 https://access.redhat.com/errata/RHSA-2020:4431

Comment 8 errata-xmlrpc 2020-11-04 02:21:01 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2020:4609 https://access.redhat.com/errata/RHSA-2020:4609

Comment 9 Product Security DevOps Team 2020-11-04 02:21:43 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):


Note You need to log in before you can comment on or make changes to this bug.