VYPR
Unrated severityNVD Advisory· Published Nov 4, 2019· Updated Aug 5, 2024

CVE-2019-18680

CVE-2019-18680

Description

An issue was discovered in the Linux kernel 4.4.x before 4.4.195. There is a NULL pointer dereference in rds_tcp_kill_sock() in net/rds/tcp.c that will cause denial of service, aka CID-91573ae4aed0.

Affected products

51

Patches

1
91573ae4aed0

net: rds: Fix NULL ptr use in rds_tcp_kill_sock

https://github.com/torvalds/linuxMao WenanSep 18, 2019via osv
1 file changed · +5 3
  • net/rds/tcp.c+5 3 modified
    @@ -352,9 +352,11 @@ static void rds_tcp_kill_sock(struct net *net)
     	}
     	spin_unlock_irq(&rds_tcp_conn_lock);
     	list_for_each_entry_safe(tc, _tc, &tmp_list, t_tcp_node) {
    -		sk = tc->t_sock->sk;
    -		sk->sk_prot->disconnect(sk, 0);
    -		tcp_done(sk);
    +		if (tc->t_sock) {
    +			sk = tc->t_sock->sk;
    +			sk->sk_prot->disconnect(sk, 0);
    +			tcp_done(sk);
    +		}
     		if (tc->conn->c_passive)
     			rds_conn_destroy(tc->conn->c_passive);
     		rds_conn_destroy(tc->conn);
    

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

5

News mentions

0

No linked articles in our index yet.