CVE-2019-11486

The Siemens R3964 line discipline driver in drivers/tty/n_r3964.c in the Linux kernel before 5.0.8 has multiple race conditions.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00037.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00043.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00071.html Third Party Advisory
http://www.openwall.com/lists/oss-security/2019/04/29/1 Mailing List Third Party Advisory
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.112 Vendor Advisory
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.35 Vendor Advisory
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.169 Vendor Advisory
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.8 Vendor Advisory
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c7084edc3f6d67750f50d4183134c4fb5712a5c8 Patch Vendor Advisory
https://github.com/torvalds/linux/commit/c7084edc3f6d67750f50d4183134c4fb5712a5c8 Patch Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/05/msg00041.html Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/05/msg00042.html Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/06/msg00011.html Third Party Advisory
https://seclists.org/bugtraq/2019/Jun/26 Mailing List Third Party Advisory
https://security.netapp.com/advisory/ntap-20190517-0005/ Third Party Advisory
https://support.f5.com/csp/article/K50222414 Third Party Advisory
https://www.debian.org/security/2019/dsa-4465 Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00037.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00043.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00071.html Third Party Advisory
http://www.openwall.com/lists/oss-security/2019/04/29/1 Mailing List Third Party Advisory
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.112 Vendor Advisory
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.35 Vendor Advisory
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.169 Vendor Advisory
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.8 Vendor Advisory
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c7084edc3f6d67750f50d4183134c4fb5712a5c8 Patch Vendor Advisory
https://github.com/torvalds/linux/commit/c7084edc3f6d67750f50d4183134c4fb5712a5c8 Patch Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/05/msg00041.html Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/05/msg00042.html Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/06/msg00011.html Third Party Advisory
https://seclists.org/bugtraq/2019/Jun/26 Mailing List Third Party Advisory
https://security.netapp.com/advisory/ntap-20190517-0005/ Third Party Advisory
https://support.f5.com/csp/article/K50222414 Third Party Advisory
https://www.debian.org/security/2019/dsa-4465 Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:netapp:active_iq:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:snapprotect:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:9.7:*:*:*:*:vmware_vsphere:*:*
cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:9.7:*:*:*:*:*:*:*
cpe:2.3:a:netapp:virtual_storage_console:9.7:*:*:*:*:vmware_vsphere:*:*

History

21 Nov 2024, 04:21

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00037.html - Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00037.html - Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00043.html - Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00043.html - Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00071.html - Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00071.html - Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2019/04/29/1 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2019/04/29/1 - Mailing List, Third Party Advisory
References () https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.112 - Vendor Advisory () https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.112 - Vendor Advisory
References () https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.35 - Vendor Advisory () https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.35 - Vendor Advisory
References () https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.169 - Vendor Advisory () https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.169 - Vendor Advisory
References () https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.8 - Vendor Advisory () https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.8 - Vendor Advisory
References () https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c7084edc3f6d67750f50d4183134c4fb5712a5c8 - Patch, Vendor Advisory () https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c7084edc3f6d67750f50d4183134c4fb5712a5c8 - Patch, Vendor Advisory
References () https://github.com/torvalds/linux/commit/c7084edc3f6d67750f50d4183134c4fb5712a5c8 - Patch, Third Party Advisory () https://github.com/torvalds/linux/commit/c7084edc3f6d67750f50d4183134c4fb5712a5c8 - Patch, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2019/05/msg00041.html - Third Party Advisory () https://lists.debian.org/debian-lts-announce/2019/05/msg00041.html - Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2019/05/msg00042.html - Third Party Advisory () https://lists.debian.org/debian-lts-announce/2019/05/msg00042.html - Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2019/06/msg00011.html - Third Party Advisory () https://lists.debian.org/debian-lts-announce/2019/06/msg00011.html - Third Party Advisory
References () https://seclists.org/bugtraq/2019/Jun/26 - Mailing List, Third Party Advisory () https://seclists.org/bugtraq/2019/Jun/26 - Mailing List, Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20190517-0005/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20190517-0005/ - Third Party Advisory
References () https://support.f5.com/csp/article/K50222414 - Third Party Advisory () https://support.f5.com/csp/article/K50222414 - Third Party Advisory
References () https://www.debian.org/security/2019/dsa-4465 - Third Party Advisory () https://www.debian.org/security/2019/dsa-4465 - Third Party Advisory

07 Jul 2023, 19:25

Type Values Removed Values Added
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00037.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00037.html - Third Party Advisory
References (MLIST) https://lists.debian.org/debian-lts-announce/2019/06/msg00011.html - (MLIST) https://lists.debian.org/debian-lts-announce/2019/06/msg00011.html - Third Party Advisory
References (MLIST) https://lists.debian.org/debian-lts-announce/2019/05/msg00041.html - (MLIST) https://lists.debian.org/debian-lts-announce/2019/05/msg00041.html - Third Party Advisory
References (CONFIRM) https://security.netapp.com/advisory/ntap-20190517-0005/ - (CONFIRM) https://security.netapp.com/advisory/ntap-20190517-0005/ - Third Party Advisory
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00043.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00043.html - Third Party Advisory
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00071.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00071.html - Third Party Advisory
References (BUGTRAQ) https://seclists.org/bugtraq/2019/Jun/26 - (BUGTRAQ) https://seclists.org/bugtraq/2019/Jun/26 - Mailing List, Third Party Advisory
References (MLIST) https://lists.debian.org/debian-lts-announce/2019/05/msg00042.html - (MLIST) https://lists.debian.org/debian-lts-announce/2019/05/msg00042.html - Third Party Advisory
References (DEBIAN) https://www.debian.org/security/2019/dsa-4465 - (DEBIAN) https://www.debian.org/security/2019/dsa-4465 - Third Party Advisory
References (CONFIRM) https://support.f5.com/csp/article/K50222414 - (CONFIRM) https://support.f5.com/csp/article/K50222414 - Third Party Advisory
CPE cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:9.7:*:*:*:*:vmware_vsphere:*:*
cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
cpe:2.3:a:netapp:snapprotect:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:active_iq:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:9.7:*:*:*:*:*:*:*
cpe:2.3:a:netapp:virtual_storage_console:9.7:*:*:*:*:vmware_vsphere:*:*
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
First Time Netapp solidfire
Netapp storage Replication Adapter For Clustered Data Ontap
Netapp snapprotect
Opensuse
Netapp
Opensuse leap
Debian debian Linux
Netapp virtual Storage Console
Netapp vasa Provider For Clustered Data Ontap
Netapp active Iq
Netapp hci Management Node
Debian

Information

Published : 2019-04-23 22:29

Updated : 2024-11-21 04:21


NVD link : CVE-2019-11486

Mitre link : CVE-2019-11486

CVE.ORG link : CVE-2019-11486


JSON object : View

Products Affected

debian

  • debian_linux

netapp

  • storage_replication_adapter_for_clustered_data_ontap
  • virtual_storage_console
  • snapprotect
  • solidfire
  • hci_management_node
  • vasa_provider_for_clustered_data_ontap
  • active_iq

opensuse

  • leap

linux

  • linux_kernel
CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')