A memory leak in the adis_update_scan_mode_burst() function in drivers/iio/imu/adis_buffer.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-9c0530e898f3.
The product does not sufficiently track and release allocated memory after it has been used, making the memory unavailable for reallocation and reuse.
Link | Tags |
---|---|
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.9 | release notes vendor advisory |
https://github.com/torvalds/linux/commit/9c0530e898f384c5d279bfcebd8bb17af1105873 | third party advisory patch |
https://usn.ubuntu.com/4208-1/ | third party advisory vendor advisory |
https://security.netapp.com/advisory/ntap-20191205-0001/ | third party advisory |
https://usn.ubuntu.com/4526-1/ | third party advisory vendor advisory |