CVE-2018-1130

Linux kernel before version 4.16-rc7 is vulnerable to a null pointer dereference in dccp_write_xmit() function in net/dccp/output.c in that allows a local user to cause a denial of service by a number of certain crafted system calls.
References
Link Resource
https://access.redhat.com/errata/RHSA-2018:1854 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3083 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3096 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1130 Issue Tracking Patch
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=67f93df79aeefc3add4e4b31a752600f834236e2 Patch
https://lists.debian.org/debian-lts-announce/2018/06/msg00000.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html Mailing List Third Party Advisory
https://marc.info/?l=linux-netdev&m=152036596825220&w=2 Mailing List Patch
https://syzkaller.appspot.com/bug?id=833568de043e0909b2aeaef7be136db39d21ba94 Third Party Advisory
https://usn.ubuntu.com/3654-1/ Third Party Advisory
https://usn.ubuntu.com/3654-2/ Third Party Advisory
https://usn.ubuntu.com/3656-1/ Third Party Advisory
https://usn.ubuntu.com/3697-1/ Third Party Advisory
https://usn.ubuntu.com/3697-2/ Third Party Advisory
https://usn.ubuntu.com/3698-1/ Third Party Advisory
https://usn.ubuntu.com/3698-2/ Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1854 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3083 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3096 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1130 Issue Tracking Patch
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=67f93df79aeefc3add4e4b31a752600f834236e2 Patch
https://lists.debian.org/debian-lts-announce/2018/06/msg00000.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html Mailing List Third Party Advisory
https://marc.info/?l=linux-netdev&m=152036596825220&w=2 Mailing List Patch
https://syzkaller.appspot.com/bug?id=833568de043e0909b2aeaef7be136db39d21ba94 Third Party Advisory
https://usn.ubuntu.com/3654-1/ Third Party Advisory
https://usn.ubuntu.com/3654-2/ Third Party Advisory
https://usn.ubuntu.com/3656-1/ Third Party Advisory
https://usn.ubuntu.com/3697-1/ Third Party Advisory
https://usn.ubuntu.com/3697-2/ Third Party Advisory
https://usn.ubuntu.com/3698-1/ Third Party Advisory
https://usn.ubuntu.com/3698-2/ Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.16:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.16:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.16:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.16:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.16:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.16:rc6:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

History

21 Nov 2024, 03:59

Type Values Removed Values Added
References () https://access.redhat.com/errata/RHSA-2018:1854 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:1854 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:3083 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:3083 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:3096 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:3096 - Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1130 - Issue Tracking, Patch () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1130 - Issue Tracking, Patch
References () https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=67f93df79aeefc3add4e4b31a752600f834236e2 - Patch () https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=67f93df79aeefc3add4e4b31a752600f834236e2 - Patch
References () https://lists.debian.org/debian-lts-announce/2018/06/msg00000.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2018/06/msg00000.html - Mailing List, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html - Mailing List, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html - Mailing List, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html - Mailing List, Third Party Advisory
References () https://marc.info/?l=linux-netdev&m=152036596825220&w=2 - Mailing List, Patch () https://marc.info/?l=linux-netdev&m=152036596825220&w=2 - Mailing List, Patch
References () https://syzkaller.appspot.com/bug?id=833568de043e0909b2aeaef7be136db39d21ba94 - Third Party Advisory () https://syzkaller.appspot.com/bug?id=833568de043e0909b2aeaef7be136db39d21ba94 - Third Party Advisory
References () https://usn.ubuntu.com/3654-1/ - Third Party Advisory () https://usn.ubuntu.com/3654-1/ - Third Party Advisory
References () https://usn.ubuntu.com/3654-2/ - Third Party Advisory () https://usn.ubuntu.com/3654-2/ - Third Party Advisory
References () https://usn.ubuntu.com/3656-1/ - Third Party Advisory () https://usn.ubuntu.com/3656-1/ - Third Party Advisory
References () https://usn.ubuntu.com/3697-1/ - Third Party Advisory () https://usn.ubuntu.com/3697-1/ - Third Party Advisory
References () https://usn.ubuntu.com/3697-2/ - Third Party Advisory () https://usn.ubuntu.com/3697-2/ - Third Party Advisory
References () https://usn.ubuntu.com/3698-1/ - Third Party Advisory () https://usn.ubuntu.com/3698-1/ - Third Party Advisory
References () https://usn.ubuntu.com/3698-2/ - Third Party Advisory () https://usn.ubuntu.com/3698-2/ - Third Party Advisory

Information

Published : 2018-05-10 13:29

Updated : 2024-11-21 03:59


NVD link : CVE-2018-1130

Mitre link : CVE-2018-1130

CVE.ORG link : CVE-2018-1130


JSON object : View

Products Affected

linux

  • linux_kernel

canonical

  • ubuntu_linux

redhat

  • enterprise_linux_desktop
  • enterprise_linux_workstation
  • enterprise_linux_server

debian

  • debian_linux
CWE
CWE-476

NULL Pointer Dereference