A NULL pointer dereference vulnerability in the function nfc_genl_deactivate_target() in net/nfc/netlink.c in the Linux kernel before 5.1.13 can be triggered by a malicious user-mode program that omits certain NFC attributes, leading to denial of service.
The product dereferences a pointer that it expects to be valid but is NULL.
Link | Tags |
---|---|
https://github.com/torvalds/linux/commit/385097a3675749cbc9e97c085c0e5dfe4269ca51 | third party advisory patch |
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.13 | release notes vendor advisory |
http://www.securityfocus.com/bid/108905 | vdb entry third party advisory |
https://security.netapp.com/advisory/ntap-20190806-0001/ | |
https://www.debian.org/security/2019/dsa-4495 | vendor advisory |
https://seclists.org/bugtraq/2019/Aug/13 | mailing list |
https://usn.ubuntu.com/4093-1/ | vendor advisory |
https://usn.ubuntu.com/4094-1/ | vendor advisory |
http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html | |
https://usn.ubuntu.com/4117-1/ | vendor advisory |
https://usn.ubuntu.com/4118-1/ | vendor advisory |