Note:
This project will be discontinued after December 13, 2021. [more]
2019-02-25
In the Linux kernel before 4.20.12, net/ipv4/netfilter/nf_nat_snmp_basic_main.c in the SNMP NAT module has insufficient ASN.1 length checks (aka an array index error), making out-of-bounds read and write operations possible, leading to an OOPS or local privilege escalation. This affects snmp_version and snmp_helper.
Products | Ubuntu_linux, Linux_kernel, Cn1610_firmware, Hci_management_node, Snapprotect, Solidfire |
Type | Out-of-bounds Write (CWE-787) |
First patch |
https://github.com/torvalds/linux/commit/c4c07b4d6fa1f11880eab8e076d3d060ef3f55fc |
Patches | http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c4c07b4d6fa1f11880eab8e076d3d060ef3f55fc |
Relevant file/s | ./net/ipv4/netfilter/nf_nat_snmp_basic_main.c (modified, +6, -1) |
Links |
• https://support.f5.com/csp/article/K31864522
• https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.12 • https://bugs.chromium.org/p/project-zero/issues/detail?id=1776 • https://security.netapp.com/advisory/ntap-20190327-0002/ • http://www.securityfocus.com/bid/107159 |
Navigation
Patch data:
Patched area:
(on by default)
Patched area: