A security flaw was discovered in the nl80211_set_rekey_data() function in net/wireless/nl80211.c in the Linux kernel through 4.13.3. This function does not check whether the required attributes are present in a Netlink request. This request can be issued by a user with the CAP_NET_ADMIN capability and may result in a NULL pointer dereference and system crash.
The product dereferences a pointer that it expects to be valid but is NULL.
Link | Tags |
---|---|
https://git.kernel.org/pub/scm/linux/kernel/git/jberg/mac80211.git/commit/?id=e785fa0a164aa11001cba931367c7f94ffaff888 | issue tracking third party advisory patch |
https://bugzilla.novell.com/show_bug.cgi?id=1058410 | issue tracking third party advisory patch |
https://usn.ubuntu.com/3583-2/ | third party advisory vendor advisory |
http://www.securityfocus.com/bid/100855 | vdb entry third party advisory |
http://www.debian.org/security/2017/dsa-3981 | third party advisory vendor advisory |
https://usn.ubuntu.com/3583-1/ | third party advisory vendor advisory |
http://seclists.org/oss-sec/2017/q3/437 | mailing list third party advisory patch |
https://bugzilla.redhat.com/show_bug.cgi?id=1491046 | issue tracking third party advisory patch |
https://marc.info/?t=150525503100001&r=1&w=2 | third party advisory patch |