Bug 1137195 - (CVE-2019-12615) VUL-0: CVE-2019-12615: kernel-source: denial of service via an unchecked kstrdup_const of node_info->vdev_port.name
(CVE-2019-12615)
VUL-0: CVE-2019-12615: kernel-source: denial of service via an unchecked kstr...
Status: RESOLVED INVALID
Classification: Novell Products
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents
unspecified
Other Other
: P5 - None : Normal
: ---
Assigned To: E-mail List
Security Team bot
https://smash.suse.de/issue/234211/
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2019-06-04 07:23 UTC by Alexander Bergmann
Modified: 2019-06-04 07:52 UTC (History)
2 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Alexander Bergmann 2019-06-04 07:23:33 UTC
CVE-2019-12615

An issue was discovered in get_vdev_port_node_info in arch/sparc/kernel/mdesc.c
in the Linux kernel through 5.1.6. There is an unchecked kstrdup_const of
node_info->vdev_port.name, which might allow an attacker to cause a denial of
service (NULL pointer dereference and system crash).

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12615
http://www.cvedetails.com/cve/CVE-2019-12615/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12615
https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg2014901.html
https://git.kernel.org/pub/scm/linux/kernel/git/davem/sparc.git/commit/?id=80caf43549e7e41a695c6d1e11066286538b336f
Comment 1 Alexander Bergmann 2019-06-04 07:52:43 UTC
This issue affects SPARC CPUs and therefore is not relevant for SUSE/openSUSE as we do not support this architecture.

Closing bug as invalid.