The Linux kernel before 4.15-rc8 was found to be vulnerable to a NULL pointer dereference bug in the __netlink_ns_capable() function in the net/netlink/af_netlink.c file. A local attacker could exploit this when a net namespace with a netnsid is assigned to cause a kernel panic and a denial of service.
References
Link | Resource |
---|---|
https://access.redhat.com/errata/RHSA-2018:3651 | Vendor Advisory |
https://access.redhat.com/errata/RHSA-2018:3666 | Vendor Advisory |
https://access.redhat.com/errata/RHSA-2018:3843 | Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14646 | Issue Tracking Patch Vendor Advisory |
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f428fe4a04cc339166c8bbd489789760de3a0cee | Patch Third Party Advisory |
https://marc.info/?l=linux-netdev&m=151500466401174&w=2 | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
No history.
Information
Published : 2018-11-26 19:29
Updated : 2024-02-28 16:48
NVD link : CVE-2018-14646
Mitre link : CVE-2018-14646
CVE.ORG link : CVE-2018-14646
JSON object : View
Products Affected
linux
- linux_kernel
redhat
- enterprise_linux_workstation
- enterprise_linux_server_eus
- enterprise_linux_server_tus
- enterprise_linux_server_aus
- enterprise_linux_server
- enterprise_linux_desktop
CWE
CWE-476
NULL Pointer Dereference