A memory leak in the ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-128c66429247.
The product does not sufficiently track and release allocated memory after it has been used, making the memory unavailable for reallocation and reuse.
Link | Tags |
---|---|
https://github.com/torvalds/linux/commit/128c66429247add5128c03dc1e144ca56f05a4e2 | third party advisory patch |
https://security.netapp.com/advisory/ntap-20191205-0001/ | third party advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LYIFGYEDQXP5DVJQQUARQRK2PXKBKQGY/ | vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YWWOOJKZ4NQYN4RMFIVJ3ZIXKJJI3MKP/ | vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html | mailing list third party advisory vendor advisory |
https://usn.ubuntu.com/4526-1/ | third party advisory vendor advisory |
https://usn.ubuntu.com/4525-1/ | third party advisory vendor advisory |
http://www.openwall.com/lists/oss-security/2021/09/14/1 | third party advisory mailing list |