A memory leak in the rpmsg_eptdev_write_iter() function in drivers/rpmsg/rpmsg_char.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering copy_from_iter_full() failures, aka CID-bbe692e349e2.
The product does not sufficiently track and release allocated memory after it has been used, making the memory unavailable for reallocation and reuse.
Link | Tags |
---|---|
https://github.com/torvalds/linux/commit/bbe692e349e2a1edf3fe0a29a0e05899c9c94d51 | third party advisory patch |
https://security.netapp.com/advisory/ntap-20191205-0001/ | third party advisory |
https://usn.ubuntu.com/4300-1/ | third party advisory vendor advisory |
https://usn.ubuntu.com/4301-1/ | third party advisory vendor advisory |