A security flaw was found in the ip_frag_reasm() function in net/ipv4/ip_fragment.c in the Linux kernel from 4.19-rc1 to 4.19-rc3 inclusive, which can cause a later system crash in ip_do_fragment(). With certain non-default, but non-rare, configuration of a victim host, an attacker can trigger this crash remotely, thus leading to a remote denial-of-service.
The product does not initialize critical variables, which causes the execution environment to use unexpected values.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5d407b071dc369c26a38398326ee2be53651cfe4 | patch vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14641 | patch issue tracking |
https://access.redhat.com/errata/RHSA-2018:2948 | third party advisory vendor advisory |
https://seclists.org/oss-sec/2018/q3/248 | patch mailing list exploit third party advisory |