A security flaw was discovered in the nl80211_set_rekey_data() function in net/wireless/nl80211.c in the Linux kernel through 4.13.3. This function does not check whether the required attributes are present in a Netlink request. This request can be issued by a user with the CAP_NET_ADMIN capability and may result in a NULL pointer dereference and system crash.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 03:08
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/oss-sec/2017/q3/437 - Mailing List, Patch, Third Party Advisory | |
References | () http://www.debian.org/security/2017/dsa-3981 - Third Party Advisory | |
References | () http://www.securityfocus.com/bid/100855 - Third Party Advisory, VDB Entry | |
References | () https://bugzilla.novell.com/show_bug.cgi?id=1058410 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1491046 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://git.kernel.org/pub/scm/linux/kernel/git/jberg/mac80211.git/commit/?id=e785fa0a164aa11001cba931367c7f94ffaff888 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://marc.info/?t=150525503100001&r=1&w=2 - Patch, Third Party Advisory | |
References | () https://usn.ubuntu.com/3583-1/ - Third Party Advisory | |
References | () https://usn.ubuntu.com/3583-2/ - Third Party Advisory |
Information
Published : 2017-09-21 15:29
Updated : 2024-11-21 03:08
NVD link : CVE-2017-12153
Mitre link : CVE-2017-12153
CVE.ORG link : CVE-2017-12153
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
canonical
- ubuntu_linux
CWE
CWE-476
NULL Pointer Dereference