In the Linux kernel before 5.0.3, a memory leak exits in hsr_dev_finalize() in net/hsr/hsr_device.c if hsr_add_port fails to add a port, which may cause denial of service, aka CID-6caabe7f197d.
The product does not sufficiently track and release allocated memory after it has been used, making the memory unavailable for reallocation and reuse.
Link | Tags |
---|---|
https://github.com/torvalds/linux/commit/6caabe7f197d3466d238f70915d65301f1716626 | third party advisory patch |
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6caabe7f197d3466d238f70915d65301f1716626 | patch vendor advisory |
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.3 | vendor advisory release notes exploit |
https://security.netapp.com/advisory/ntap-20191031-0005/ | third party advisory |
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html | vendor advisory mailing list third party advisory |
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html | vendor advisory mailing list third party advisory |