In the Linux kernel, the following vulnerability has been resolved: SUNRPC: Fix loop termination condition in gss_free_in_token_pages() The in_token->pages[] array is not NULL terminated. This results in the following KASAN splat: KASAN: maybe wild-memory-access in range [0x04a2013400000008-0x04a201340000000f]
Product | Vendor | Version |
---|---|---|
Linux | Linux | < 1.0.7 |
Linux | Linux | 21.0 ap346261 |
Linux | Linux | < 10.1.0 |
Linux | Linux | prior to V1.0.10.94 |