An issue was discovered in dlpar_parse_cc_property in
arch/powerpc/platforms/pseries/dlpar.c in the Linux kernel through 5.1.6. There
is an unchecked kstrdup of prop->name, which might allow an attacker to cause a
denial of service (NULL pointer dereference and system crash).
Created kernel tracking bugs for this issue:
Affects: fedora-all [bug 1718185]
Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
An attacker needs to be highly privileged to exploit this issue. He either needs to trigger LPAR configuration change (or wait for such event to happen) and incur low memory conditions at the same time. It could be argued that possessing privileges required to exploit this issue could have the same impact as the issue itself.
The indications say that this issue was found by static code analysing tool which looks for memory allocations without failure checks and not actually reproduced on a running system. The CVE assignment also looks automated and following the "better be safe than sorry" approach.
As such, this issue is theoretical in nature and Low impact at best.
This issue has been addressed in the following products:
Red Hat Enterprise Linux 7
Via RHSA-2020:2104 https://access.redhat.com/errata/RHSA-2020:2104
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):