CVE Vulnerabilities

CVE-2018-1000026

This vulnerability is marked as RESERVED by NVD. This means that the CVE-ID is reserved for future use by the CVE Numbering Authority (CNA) or a security researcher, but the details of it are not yet publicly available yet.

This page will reflect the classification results once they are available through NVD.

Any vendor information available is shown as below.

Redhat

CVE-2018-1000026 kernel: Improper validation in bnx2x network card driver can allow for denial of service attacks via crafted packet

Affected Software List

NameVendorVersion
Red Hat Enterprise Linux 7RedHatkernel-rt-0:3.10.0-957.rt56.910.el7
Red Hat Enterprise Linux 7RedHatkernel-alt-0:4.14.0-115.el7a
Red Hat Enterprise Linux 7RedHatkernel-0:3.10.0-957.el7

Ubuntu

Linux Linux kernel version at least v4.8 onwards, probably well before contains a Insufficient input validation vulnerability in bnx2x network card driver that can result in DoS: Network card firmware assertion takes card off-line. This attack appear to be exploitable via An attacker on a must pass a very large, specially crafted packet to the bnx2x card. This can be done from an untrusted guest VM..

Affected Software List

NameVendorVersion
Linux-lts-vividUbuntu/upstream4.16~rc1
Linux-lts-vividUbuntu/trustywas needs-triage now end-of-life
LinuxUbuntu/precise/esmwas needed ESM criteria
LinuxUbuntu/trusty3.13.0-144.193
LinuxUbuntu/trusty/esm3.13.0-144.193
LinuxUbuntu/upstream4.16~rc1
LinuxUbuntu/xenial4.4.0-119.143
LinuxUbuntu/artful4.13.0-38.43
Linux-goldfishUbuntu/upstream4.16~rc1
Linux-goldfishUbuntu/xenialwas needed now end-of-life
Linux-goldfishUbuntu/trustyabandoned
Linux-linaro-sharedUbuntu/upstream4.16~rc1
Linux-grouperUbuntu/trustyabandoned
Linux-grouperUbuntu/upstream4.16~rc1
Linux-lts-raringUbuntu/precise/esmend-of-life
Linux-lts-raringUbuntu/upstream4.16~rc1
Linux-raspi2Ubuntu/upstream4.16~rc1
Linux-raspi2Ubuntu/xenial4.4.0-1086.94
Linux-raspi2Ubuntu/artful4.13.0-1016.17
Linux-ti-omap4Ubuntu/upstream4.16~rc1
Linux-armadaxpUbuntu/upstream4.16~rc1
Linux-awsUbuntu/trusty4.4.0-1016.16
Linux-awsUbuntu/trusty/esm4.4.0-1016.16
Linux-awsUbuntu/upstream4.16~rc1
Linux-awsUbuntu/xenial4.4.0-1054.63
Linux-floUbuntu/trustyabandoned
Linux-floUbuntu/upstream4.16~rc1
Linux-floUbuntu/xenialabandoned
Linux-lts-quantalUbuntu/precise/esmend-of-life
Linux-lts-quantalUbuntu/upstream4.16~rc1
Linux-lts-trustyUbuntu/upstream4.16~rc1
Linux-lts-trustyUbuntu/precise/esm3.13.0-144.193~precise1
Linux-euclidUbuntu/upstream4.16~rc1
Linux-euclidUbuntu/xenialwas needed ESM criteria
Linux-hweUbuntu/upstream4.16~rc1
Linux-hweUbuntu/xenial4.13.0-38.43~16.04.1
Linux-linaro-vexpressUbuntu/upstream4.16~rc1
Linux-hwe-edgeUbuntu/bionic4.18.0-8.9~18.04.1
Linux-hwe-edgeUbuntu/upstream4.16~rc1
Linux-hwe-edgeUbuntu/xenial4.13.0-38.43~16.04.1
Linux-linaro-omapUbuntu/upstream4.16~rc1
Linux-lts-saucyUbuntu/precise/esmend-of-life
Linux-lts-saucyUbuntu/upstream4.16~rc1
Linux-krillinUbuntu/productwas needed now end-of-life
Linux-kvmUbuntu/upstream4.16~rc1
Linux-kvmUbuntu/xenial4.4.0-1020.25
Linux-oemUbuntu/xenial4.13.0-1022.24
Linux-oemUbuntu/upstream4.16~rc1
Linux-qcm-msmUbuntu/upstream4.16~rc1
Linux-snapdragonUbuntu/upstream4.16~rc1
Linux-snapdragonUbuntu/xenial4.4.0-1088.93
Linux-snapdragonUbuntu/artful4.4.0-1088.93
Linux-gkeUbuntu/upstream4.16~rc1
Linux-gkeUbuntu/xenialwas needed now end-of-life
Linux-lts-utopicUbuntu/trustyout of standard support
Linux-lts-utopicUbuntu/upstream4.16~rc1
Linux-lts-xenialUbuntu/trusty4.4.0-119.143~14.04.1
Linux-lts-xenialUbuntu/trusty/esm4.4.0-119.143~14.04.1
Linux-lts-xenialUbuntu/upstream4.16~rc1
Linux-gcpUbuntu/upstream4.16~rc1
Linux-gcpUbuntu/xenial4.13.0-1012.16
Linux-lts-wilyUbuntu/upstream4.16~rc1
Linux-lts-wilyUbuntu/trustyout of standard support
Linux-mantaUbuntu/trustyabandoned
Linux-mantaUbuntu/upstream4.16~rc1
Linux-vegetahdUbuntu/productwas needed now end-of-life
Linux-azureUbuntu/upstream4.16~rc1
Linux-azureUbuntu/xenial4.13.0-1014.17
Linux-maguroUbuntu/trustyabandoned
Linux-maguroUbuntu/upstream4.16~rc1
Linux-makoUbuntu/upstream4.16~rc1
Linux-makoUbuntu/xenialabandoned
Linux-makoUbuntu/trustyabandoned