A flaw was found in the crypto subsystem of the Linux kernel before version kernel-4.15-rc4. The "null skcipher" was being dropped when each af_alg_ctx was freed instead of when the aead_tfm was freed. This can cause the null skcipher to be freed while it is still in use leading to a local user being able to crash the system or possibly escalate privileges.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/105200 | Third Party Advisory VDB Entry |
https://access.redhat.com/errata/RHSA-2018:2948 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14619 | Issue Tracking Third Party Advisory |
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b32a7dc8aef1882fbf983eb354837488cc9d54dc | Patch Vendor Advisory |
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0013 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2018-08-30 12:29
Updated : 2024-02-04 20:03
NVD link : CVE-2018-14619
Mitre link : CVE-2018-14619
CVE.ORG link : CVE-2018-14619
JSON object : View
Products Affected
linux
- linux_kernel