The Linux kernel before 4.15-rc8 was found to be vulnerable to a NULL pointer dereference bug in the __netlink_ns_capable() function in the net/netlink/af_netlink.c file. A local attacker could exploit this when a net namespace with a netnsid is assigned to cause a kernel panic and a denial of service.
A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Linux_kernel | Linux | * | 4.14 (including) |
Linux_kernel | Linux | 4.15-rc1 (including) | 4.15-rc1 (including) |
Linux_kernel | Linux | 4.15-rc2 (including) | 4.15-rc2 (including) |
Linux_kernel | Linux | 4.15-rc3 (including) | 4.15-rc3 (including) |
Linux_kernel | Linux | 4.15-rc4 (including) | 4.15-rc4 (including) |
Linux_kernel | Linux | 4.15-rc5 (including) | 4.15-rc5 (including) |
Linux_kernel | Linux | 4.15-rc6 (including) | 4.15-rc6 (including) |
Linux_kernel | Linux | 4.15-rc7 (including) | 4.15-rc7 (including) |
Red Hat Enterprise Linux 7 | RedHat | kernel-rt-0:3.10.0-957.1.3.rt56.913.el7 | * |
Red Hat Enterprise Linux 7 | RedHat | kernel-0:3.10.0-957.1.3.el7 | * |
Red Hat Enterprise Linux 7.5 Extended Update Support | RedHat | kernel-0:3.10.0-862.25.3.el7 | * |
Linux | Ubuntu | precise/esm | * |
Linux-aws | Ubuntu | upstream | * |
Linux-azure | Ubuntu | upstream | * |
Linux-azure-edge | Ubuntu | upstream | * |
Linux-euclid | Ubuntu | esm-apps/xenial | * |
Linux-euclid | Ubuntu | upstream | * |
Linux-euclid | Ubuntu | xenial | * |
Linux-flo | Ubuntu | esm-apps/xenial | * |
Linux-flo | Ubuntu | trusty | * |
Linux-flo | Ubuntu | upstream | * |
Linux-flo | Ubuntu | xenial | * |
Linux-gcp | Ubuntu | upstream | * |
Linux-gke | Ubuntu | upstream | * |
Linux-gke | Ubuntu | xenial | * |
Linux-goldfish | Ubuntu | esm-apps/xenial | * |
Linux-goldfish | Ubuntu | trusty | * |
Linux-goldfish | Ubuntu | upstream | * |
Linux-goldfish | Ubuntu | xenial | * |
Linux-grouper | Ubuntu | trusty | * |
Linux-grouper | Ubuntu | upstream | * |
Linux-hwe | Ubuntu | upstream | * |
Linux-hwe-edge | Ubuntu | upstream | * |
Linux-kvm | Ubuntu | upstream | * |
Linux-lts-trusty | Ubuntu | precise/esm | * |
Linux-lts-trusty | Ubuntu | upstream | * |
Linux-lts-utopic | Ubuntu | trusty | * |
Linux-lts-utopic | Ubuntu | upstream | * |
Linux-lts-vivid | Ubuntu | trusty | * |
Linux-lts-vivid | Ubuntu | upstream | * |
Linux-lts-wily | Ubuntu | trusty | * |
Linux-lts-wily | Ubuntu | upstream | * |
Linux-lts-xenial | Ubuntu | upstream | * |
Linux-maguro | Ubuntu | trusty | * |
Linux-maguro | Ubuntu | upstream | * |
Linux-mako | Ubuntu | esm-apps/xenial | * |
Linux-mako | Ubuntu | trusty | * |
Linux-mako | Ubuntu | upstream | * |
Linux-mako | Ubuntu | xenial | * |
Linux-manta | Ubuntu | trusty | * |
Linux-manta | Ubuntu | upstream | * |
Linux-oem | Ubuntu | upstream | * |
Linux-oem | Ubuntu | xenial | * |
Linux-raspi2 | Ubuntu | upstream | * |
Linux-snapdragon | Ubuntu | upstream | * |