APPLIED: [PATCH 0/1] [SRU Xenial] CVE-2019-16231
Stefan Bader
stefan.bader at canonical.com
Fri Feb 26 08:55:29 UTC 2021
On 19.02.21 20:16, Tim Gardner wrote:
> [Impact]
> Unchecked allocation failures in the fjes network driver could cause NULL pointer
> access. It was discovered that the Fujitsu ES network device driver for the Linux
> kernel did not properly check for errors in some situations, leading to a NULL
> pointer dereference. A local attacker could use this to cause a denial of service.
>
> [Test Case]
> Given the nature of the failure, no test case is possible.
>
> [Potential regression]
> The patch is straightforward. Even if one of the allocation failure paths has an
> error, the code is no more broken then it is now. Currently any allocation failure will
> cause a seg fault. This patch has been released in Bionic 4.15.0-74.84.
>
>
Applied to xenial:linux/master-next with fixed up s-o-b area. Thanks.
-Stefan
More information about the kernel-team
mailing list