CVE-2019-11486

The Siemens R3964 line discipline driver in drivers/tty/n_r3964.c in the Linux kernel before 5.0.8 has multiple race conditions.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00037.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00043.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00071.html Third Party Advisory
http://www.openwall.com/lists/oss-security/2019/04/29/1 Mailing List Third Party Advisory
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.112 Vendor Advisory
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.35 Vendor Advisory
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.169 Vendor Advisory
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.8 Vendor Advisory
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c7084edc3f6d67750f50d4183134c4fb5712a5c8 Patch Vendor Advisory
https://github.com/torvalds/linux/commit/c7084edc3f6d67750f50d4183134c4fb5712a5c8 Patch Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/05/msg00041.html Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/05/msg00042.html Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/06/msg00011.html Third Party Advisory
https://seclists.org/bugtraq/2019/Jun/26 Mailing List Third Party Advisory
https://security.netapp.com/advisory/ntap-20190517-0005/ Third Party Advisory
https://support.f5.com/csp/article/K50222414 Third Party Advisory
https://www.debian.org/security/2019/dsa-4465 Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:netapp:active_iq:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:snapprotect:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:9.7:*:*:*:*:vmware_vsphere:*:*
cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:9.7:*:*:*:*:*:*:*
cpe:2.3:a:netapp:virtual_storage_console:9.7:*:*:*:*:vmware_vsphere:*:*

History

07 Jul 2023, 19:25

Type Values Removed Values Added
CPE cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:9.7:*:*:*:*:*:*:*
cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:9.7:*:*:*:*:vmware_vsphere:*:*
cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:a:netapp:active_iq:-:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
cpe:2.3:a:netapp:virtual_storage_console:9.7:*:*:*:*:vmware_vsphere:*:*
cpe:2.3:a:netapp:snapprotect:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*
First Time Netapp solidfire
Opensuse leap
Netapp snapprotect
Netapp hci Management Node
Netapp vasa Provider For Clustered Data Ontap
Debian debian Linux
Opensuse
Netapp
Netapp storage Replication Adapter For Clustered Data Ontap
Netapp virtual Storage Console
Netapp active Iq
Debian
References (CONFIRM) https://security.netapp.com/advisory/ntap-20190517-0005/ - (CONFIRM) https://security.netapp.com/advisory/ntap-20190517-0005/ - Third Party Advisory
References (MLIST) https://lists.debian.org/debian-lts-announce/2019/05/msg00042.html - (MLIST) https://lists.debian.org/debian-lts-announce/2019/05/msg00042.html - Third Party Advisory
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00071.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00071.html - Third Party Advisory
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00037.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00037.html - Third Party Advisory
References (CONFIRM) https://support.f5.com/csp/article/K50222414 - (CONFIRM) https://support.f5.com/csp/article/K50222414 - Third Party Advisory
References (MLIST) https://lists.debian.org/debian-lts-announce/2019/06/msg00011.html - (MLIST) https://lists.debian.org/debian-lts-announce/2019/06/msg00011.html - Third Party Advisory
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00043.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00043.html - Third Party Advisory
References (BUGTRAQ) https://seclists.org/bugtraq/2019/Jun/26 - (BUGTRAQ) https://seclists.org/bugtraq/2019/Jun/26 - Mailing List, Third Party Advisory
References (MLIST) https://lists.debian.org/debian-lts-announce/2019/05/msg00041.html - (MLIST) https://lists.debian.org/debian-lts-announce/2019/05/msg00041.html - Third Party Advisory
References (DEBIAN) https://www.debian.org/security/2019/dsa-4465 - (DEBIAN) https://www.debian.org/security/2019/dsa-4465 - Third Party Advisory

Information

Published : 2019-04-23 22:29

Updated : 2024-02-28 17:08


NVD link : CVE-2019-11486

Mitre link : CVE-2019-11486

CVE.ORG link : CVE-2019-11486


JSON object : View

Products Affected

netapp

  • virtual_storage_console
  • storage_replication_adapter_for_clustered_data_ontap
  • hci_management_node
  • vasa_provider_for_clustered_data_ontap
  • active_iq
  • snapprotect
  • solidfire

opensuse

  • leap

linux

  • linux_kernel

debian

  • debian_linux
CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')