Bug 1851480 (CVE-2019-19227) - CVE-2019-19227 kernel: potential NULL pointer dereference leads to DoS
Summary: CVE-2019-19227 kernel: potential NULL pointer dereference leads to DoS
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2019-19227
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1851481
Blocks: 1851482
TreeView+ depends on / blocked
 
Reported: 2020-06-26 16:54 UTC by Dhananjay Arunesh
Modified: 2023-10-06 20:53 UTC (History)
47 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2020-07-06 09:29:57 UTC
Embargoed:


Attachments (Terms of Use)

Description Dhananjay Arunesh 2020-06-26 16:54:25 UTC
A vulnerability was found in Linux Kernel, where a potential NULL pointer dereference because register_snap_client may return NULL. This will lead to denial of service in net/appletalk/aarp.c and net/appletalk/ddp.c, as demonstrated by unregister_snap_client.

References:
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9804501fa1228048857910a6bf23e085aade37cc

Comment 1 Dhananjay Arunesh 2020-06-26 16:55:20 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 1851481]

Comment 2 Justin M. Forbes 2020-06-29 14:29:45 UTC
This was fixed for Fedora with the 5.1 kernel rebases.

Comment 3 Alex 2020-07-06 09:29:57 UTC
The affected functionality not used by rhel* (means not inside kernel).
Checked that non-relevant for rhel*.
Closing as NOTABUG.


Note You need to log in before you can comment on or make changes to this bug.