An issue was discovered in ip_ra_control in net/ipv4/ip_sockglue.c in the Linux kernel through 5.1.5. There is an unchecked kmalloc of new_ra, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash). NOTE: this is disputed because new_ra is never used if it is NULL
The product dereferences a pointer that it expects to be valid but is NULL.
Link | Tags |
---|---|
https://lkml.org/lkml/2019/5/25/230 | patch mailing list third party advisory |
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=425aa0e1d01513437668fa3d4a971168bbaa8515 | patch vendor advisory mailing list |
http://www.securityfocus.com/bid/108473 | third party advisory vdb entry |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/ | vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/ | vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1715501 |