The Linux kernel before 4.15-rc8 was found to be vulnerable to a NULL pointer dereference bug in the __netlink_ns_capable() function in the net/netlink/af_netlink.c file. A local attacker could exploit this when a net namespace with a netnsid is assigned to cause a kernel panic and a denial of service.
The product dereferences a pointer that it expects to be valid but is NULL.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2018:3843 | vendor advisory |
https://access.redhat.com/errata/RHSA-2018:3666 | vendor advisory |
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f428fe4a04cc339166c8bbd489789760de3a0cee | third party advisory patch |
https://access.redhat.com/errata/RHSA-2018:3651 | vendor advisory |
https://marc.info/?l=linux-netdev&m=151500466401174&w=2 | third party advisory patch |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14646 | issue tracking patch vendor advisory |