An issue was discovered in the Linux kernel 4.4.x before 4.4.195. There is a NULL pointer dereference in rds_tcp_kill_sock() in net/rds/tcp.c that will cause denial of service, aka CID-91573ae4aed0.
The product dereferences a pointer that it expects to be valid but is NULL.
Link | Tags |
---|---|
https://lkml.org/lkml/2019/9/18/337 | mailing list exploit vendor advisory |
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.195 | exploit patch vendor advisory |
https://github.com/torvalds/linux/commit/91573ae4aed0a49660abdad4d42f2a0db995ee5e | third party advisory patch |
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=91573ae4aed0a49660abdad4d42f2a0db995ee5e | patch vendor advisory |
https://security.netapp.com/advisory/ntap-20191205-0001/ | third party advisory |