A security flaw was found in the ip_frag_reasm() function in net/ipv4/ip_fragment.c in the Linux kernel from 4.19-rc1 to 4.19-rc3 inclusive, which can cause a later system crash in ip_do_fragment(). With certain non-default, but non-rare, configuration of a victim host, an attacker can trigger this crash remotely, thus leading to a remote denial-of-service.
The product does not initialize critical variables, which causes the execution environment to use unexpected values.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Linux_kernel | Linux | 4.19-rc1 (including) | 4.19-rc1 (including) |
Linux_kernel | Linux | 4.19-rc2 (including) | 4.19-rc2 (including) |
Linux_kernel | Linux | 4.19-rc3 (including) | 4.19-rc3 (including) |
Red Hat Enterprise Linux 7 | RedHat | kernel-alt-0:4.14.0-115.el7a | * |
Linux | Ubuntu | upstream | * |
Linux-aws | Ubuntu | upstream | * |
Linux-azure | Ubuntu | upstream | * |
Linux-azure-edge | Ubuntu | upstream | * |
Linux-euclid | Ubuntu | upstream | * |
Linux-flo | Ubuntu | esm-apps/xenial | * |
Linux-flo | Ubuntu | trusty | * |
Linux-flo | Ubuntu | upstream | * |
Linux-flo | Ubuntu | xenial | * |
Linux-gcp | Ubuntu | upstream | * |
Linux-gke | Ubuntu | upstream | * |
Linux-gke | Ubuntu | xenial | * |
Linux-goldfish | Ubuntu | esm-apps/xenial | * |
Linux-goldfish | Ubuntu | trusty | * |
Linux-goldfish | Ubuntu | upstream | * |
Linux-goldfish | Ubuntu | xenial | * |
Linux-grouper | Ubuntu | trusty | * |
Linux-grouper | Ubuntu | upstream | * |
Linux-hwe | Ubuntu | upstream | * |
Linux-hwe-edge | Ubuntu | upstream | * |
Linux-kvm | Ubuntu | upstream | * |
Linux-lts-trusty | Ubuntu | upstream | * |
Linux-lts-utopic | Ubuntu | trusty | * |
Linux-lts-utopic | Ubuntu | upstream | * |
Linux-lts-vivid | Ubuntu | trusty | * |
Linux-lts-vivid | Ubuntu | upstream | * |
Linux-lts-wily | Ubuntu | trusty | * |
Linux-lts-wily | Ubuntu | upstream | * |
Linux-lts-xenial | Ubuntu | upstream | * |
Linux-maguro | Ubuntu | trusty | * |
Linux-maguro | Ubuntu | upstream | * |
Linux-mako | Ubuntu | esm-apps/xenial | * |
Linux-mako | Ubuntu | trusty | * |
Linux-mako | Ubuntu | upstream | * |
Linux-mako | Ubuntu | xenial | * |
Linux-manta | Ubuntu | trusty | * |
Linux-manta | Ubuntu | upstream | * |
Linux-oem | Ubuntu | upstream | * |
Linux-raspi2 | Ubuntu | upstream | * |
Linux-snapdragon | Ubuntu | upstream | * |