CVE-2019-12615

An issue was discovered in get_vdev_port_node_info in arch/sparc/kernel/mdesc.c in the Linux kernel through 5.1.6. There is an unchecked kstrdup_const of node_info->vdev_port.name, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash).
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.2:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.2:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.2:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.2:rc4:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:netapp:aff_a700s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:aff_a700s:-:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:netapp:cn1610_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:cn1610:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:netapp:h610s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h610s:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:23

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/108549 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/108549 - Third Party Advisory, VDB Entry
References () https://git.kernel.org/pub/scm/linux/kernel/git/davem/sparc.git/commit/?id=80caf43549e7e41a695c6d1e11066286538b336f - Patch, Vendor Advisory () https://git.kernel.org/pub/scm/linux/kernel/git/davem/sparc.git/commit/?id=80caf43549e7e41a695c6d1e11066286538b336f - Patch, Vendor Advisory
References () https://security.netapp.com/advisory/ntap-20190710-0002/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20190710-0002/ - Third Party Advisory
References () https://support.f5.com/csp/article/K60924046 - Third Party Advisory () https://support.f5.com/csp/article/K60924046 - Third Party Advisory
References () https://support.f5.com/csp/article/K60924046?utm_source=f5support&amp%3Butm_medium=RSS - () https://support.f5.com/csp/article/K60924046?utm_source=f5support&amp%3Butm_medium=RSS -
References () https://www.mail-archive.com/linux-kernel%40vger.kernel.org/msg2014901.html - () https://www.mail-archive.com/linux-kernel%40vger.kernel.org/msg2014901.html -

02 Jun 2021, 15:21

Type Values Removed Values Added
References (CONFIRM) https://support.f5.com/csp/article/K60924046 - (CONFIRM) https://support.f5.com/csp/article/K60924046 - Third Party Advisory
References (MISC) https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg2014901.html - Patch, Vendor Advisory (MISC) https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg2014901.html - Third Party Advisory
References (CONFIRM) https://support.f5.com/csp/article/K60924046?utm_source=f5support&utm_medium=RSS - (CONFIRM) https://support.f5.com/csp/article/K60924046?utm_source=f5support&utm_medium=RSS - Third Party Advisory
References (CONFIRM) https://security.netapp.com/advisory/ntap-20190710-0002/ - (CONFIRM) https://security.netapp.com/advisory/ntap-20190710-0002/ - Third Party Advisory
CPE cpe:2.3:o:linux:linux_kernel:2.6.12:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc3:*:*:*:*:*:*
cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.2:rc2:*:*:*:*:*:*
cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:cn1610_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h610s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.2:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.2:rc4:*:*:*:*:*:*
cpe:2.3:o:netapp:aff_a700s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:cn1610:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h610s:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.2:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*
cpe:2.3:h:netapp:aff_a700s:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc2:*:*:*:*:*:*

Information

Published : 2019-06-03 22:29

Updated : 2024-11-21 04:23


NVD link : CVE-2019-12615

Mitre link : CVE-2019-12615

CVE.ORG link : CVE-2019-12615


JSON object : View

Products Affected

netapp

  • h610s_firmware
  • solidfire
  • aff_a700s_firmware
  • aff_a700s
  • cn1610_firmware
  • cn1610
  • active_iq_unified_manager
  • h610s
  • hci_management_node

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference