CVE-2017-12153

A security flaw was discovered in the nl80211_set_rekey_data() function in net/wireless/nl80211.c in the Linux kernel through 4.13.3. This function does not check whether the required attributes are present in a Netlink request. This request can be issued by a user with the CAP_NET_ADMIN capability and may result in a NULL pointer dereference and system crash.
References
Link Resource
http://seclists.org/oss-sec/2017/q3/437 Mailing List Patch Third Party Advisory
http://www.debian.org/security/2017/dsa-3981 Third Party Advisory
http://www.securityfocus.com/bid/100855 Third Party Advisory VDB Entry
https://bugzilla.novell.com/show_bug.cgi?id=1058410 Issue Tracking Patch Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1491046 Issue Tracking Patch Third Party Advisory
https://git.kernel.org/pub/scm/linux/kernel/git/jberg/mac80211.git/commit/?id=e785fa0a164aa11001cba931367c7f94ffaff888 Issue Tracking Patch Third Party Advisory
https://marc.info/?t=150525503100001&r=1&w=2 Patch Third Party Advisory
https://usn.ubuntu.com/3583-1/ Third Party Advisory
https://usn.ubuntu.com/3583-2/ Third Party Advisory
http://seclists.org/oss-sec/2017/q3/437 Mailing List Patch Third Party Advisory
http://www.debian.org/security/2017/dsa-3981 Third Party Advisory
http://www.securityfocus.com/bid/100855 Third Party Advisory VDB Entry
https://bugzilla.novell.com/show_bug.cgi?id=1058410 Issue Tracking Patch Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1491046 Issue Tracking Patch Third Party Advisory
https://git.kernel.org/pub/scm/linux/kernel/git/jberg/mac80211.git/commit/?id=e785fa0a164aa11001cba931367c7f94ffaff888 Issue Tracking Patch Third Party Advisory
https://marc.info/?t=150525503100001&r=1&w=2 Patch Third Party Advisory
https://usn.ubuntu.com/3583-1/ Third Party Advisory
https://usn.ubuntu.com/3583-2/ Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*

History

21 Nov 2024, 03:08

Type Values Removed Values Added
References () http://seclists.org/oss-sec/2017/q3/437 - Mailing List, Patch, Third Party Advisory () http://seclists.org/oss-sec/2017/q3/437 - Mailing List, Patch, Third Party Advisory
References () http://www.debian.org/security/2017/dsa-3981 - Third Party Advisory () http://www.debian.org/security/2017/dsa-3981 - Third Party Advisory
References () http://www.securityfocus.com/bid/100855 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/100855 - Third Party Advisory, VDB Entry
References () https://bugzilla.novell.com/show_bug.cgi?id=1058410 - Issue Tracking, Patch, Third Party Advisory () https://bugzilla.novell.com/show_bug.cgi?id=1058410 - Issue Tracking, Patch, Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=1491046 - Issue Tracking, Patch, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=1491046 - Issue Tracking, Patch, Third Party Advisory
References () https://git.kernel.org/pub/scm/linux/kernel/git/jberg/mac80211.git/commit/?id=e785fa0a164aa11001cba931367c7f94ffaff888 - Issue Tracking, Patch, Third Party Advisory () https://git.kernel.org/pub/scm/linux/kernel/git/jberg/mac80211.git/commit/?id=e785fa0a164aa11001cba931367c7f94ffaff888 - Issue Tracking, Patch, Third Party Advisory
References () https://marc.info/?t=150525503100001&r=1&w=2 - Patch, Third Party Advisory () https://marc.info/?t=150525503100001&r=1&w=2 - Patch, Third Party Advisory
References () https://usn.ubuntu.com/3583-1/ - Third Party Advisory () https://usn.ubuntu.com/3583-1/ - Third Party Advisory
References () https://usn.ubuntu.com/3583-2/ - Third Party Advisory () https://usn.ubuntu.com/3583-2/ - Third Party Advisory

Information

Published : 2017-09-21 15:29

Updated : 2024-11-21 03:08


NVD link : CVE-2017-12153

Mitre link : CVE-2017-12153

CVE.ORG link : CVE-2017-12153


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel

canonical

  • ubuntu_linux
CWE
CWE-476

NULL Pointer Dereference