Bugzilla – Bug 1154617
VUL-1: CVE-2019-18198: kernel-source: memory corruption due to a reference count usage error in the fib6_rule_suppress() function
Last modified: 2024-06-25 14:02:00 UTC
CVE-2019-18198 In the Linux kernel before 5.3.4, a reference count usage error in the fib6_rule_suppress() function in the fib6 suppression feature of net/ipv6/fib6_rules.c, when handling the FIB_LOOKUP_NOREF flag, can be exploited by a local attacker to corrupt memory, aka CID-ca7a03c41753. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-18198 http://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-18198.html http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18198 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.4 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ca7a03c4175366a92cee0ccc4fec0038c3266e26 https://github.com/torvalds/linux/commit/ca7a03c4175366a92cee0ccc4fec0038c3266e26 https://launchpad.net/bugs/1847478
It seems that only Factory is affected. All the internal codestreams are not affected.
The commit 7d9e5f422150 is included in 5.3-rc1, which is for SLE15-SP2 / Leap 15.2, too.
(In reply to Takashi Iwai from comment #2) > The commit 7d9e5f422150 is included in 5.3-rc1, which is for SLE15-SP2 / > Leap 15.2, too. Yes, but commit ca7a03c41753 has been picked for 5.3.4 stable update and SLE15-SP2 and openSUSE-15.2 are already at 5.3.7 so all we need is to add the CVE and bugzilla references.
OK, I updated the reference. Reassigned back to security team.
Done