CVE-2019-12615
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
03/06/2019
Last modified:
07/11/2023
Description
An issue was discovered in get_vdev_port_node_info in arch/sparc/kernel/mdesc.c in the Linux kernel through 5.1.6. There is an unchecked kstrdup_const of node_info->vdev_port.name, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash).
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Base Score 2.0
7.80
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 2.6.12.1 (including) | 4.14.130 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.19 (including) | 4.19.56 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.1 (including) | 5.1.15 (excluding) |
| cpe:2.3:o:linux:linux_kernel:2.6.12:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.12:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.12:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.2:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.2:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.2:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.2:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:netapp:aff_a700s_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:netapp:aff_a700s:-:*:*:*:*:*:*:* | ||
| cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:* | 9.5 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://www.securityfocus.com/bid/108549
- https://git.kernel.org/pub/scm/linux/kernel/git/davem/sparc.git/commit/?id=80caf43549e7e41a695c6d1e11066286538b336f
- https://security.netapp.com/advisory/ntap-20190710-0002/
- https://support.f5.com/csp/article/K60924046
- https://support.f5.com/csp/article/K60924046?utm_source=f5support&%3Butm_medium=RSS
- https://www.mail-archive.com/linux-kernel%40vger.kernel.org/msg2014901.html



