2018-02-09 18:03:45 -05:00
{
"CVE_data_meta" : {
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org" ,
"DATE_ASSIGNED" : "1/18/2018 7:01:42" ,
"ID" : "CVE-2018-1000026" ,
"REQUESTER" : "dja@axtens.net" ,
"STATE" : "PUBLIC"
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "Linux kernel" ,
"version" : {
"version_data" : [
{
"version_value" : "at least v4.8 onwards, probably well before"
}
]
}
}
]
} ,
"vendor_name" : "Linux"
}
]
}
} ,
"data_format" : "MITRE" ,
"data_type" : "CVE" ,
"data_version" : "4.0" ,
"description" : {
"description_data" : [
{
"lang" : "eng" ,
"value" : "Linux Linux kernel version at least v4.8 onwards, probably well before contains a Insufficient input validation vulnerability in bnx2x network card driver that can result in DoS: Network card firmware assertion takes card off-line. This attack appear to be exploitable via An attacker on a must pass a very large, specially crafted packet to the bnx2x card. This can be done from an untrusted guest VM.."
}
]
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "Insufficient input validation"
}
]
}
]
} ,
"references" : {
"reference_data" : [
{
2018-04-05 09:33:01 -04:00
"name" : "[netdev] 20180116 http://lists.openwall.net/netdev/2018/01/16/40" ,
"refsource" : "MLIST" ,
2018-02-09 18:03:45 -05:00
"url" : "http://lists.openwall.net/netdev/2018/01/16/40"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "[netdev] 20180118 http://lists.openwall.net/netdev/2018/01/18/96" ,
"refsource" : "MLIST" ,
2018-02-09 18:03:45 -05:00
"url" : "http://lists.openwall.net/netdev/2018/01/18/96"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "https://patchwork.ozlabs.org/patch/859410/" ,
"refsource" : "MISC" ,
2018-02-09 18:03:45 -05:00
"url" : "https://patchwork.ozlabs.org/patch/859410/"
2018-04-04 06:02:39 -04:00
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "USN-3617-1" ,
"refsource" : "UBUNTU" ,
2018-04-04 06:02:39 -04:00
"url" : "https://usn.ubuntu.com/3617-1/"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "USN-3617-2" ,
"refsource" : "UBUNTU" ,
2018-04-04 06:02:39 -04:00
"url" : "https://usn.ubuntu.com/3617-2/"
2018-04-05 06:09:06 -04:00
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "USN-3617-3" ,
"refsource" : "UBUNTU" ,
2018-04-05 06:09:06 -04:00
"url" : "https://usn.ubuntu.com/3617-3/"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "USN-3619-1" ,
"refsource" : "UBUNTU" ,
2018-04-05 06:09:06 -04:00
"url" : "https://usn.ubuntu.com/3619-1/"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "USN-3620-1" ,
"refsource" : "UBUNTU" ,
2018-04-05 06:09:06 -04:00
"url" : "https://usn.ubuntu.com/3620-1/"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "USN-3620-2" ,
"refsource" : "UBUNTU" ,
2018-04-05 06:09:06 -04:00
"url" : "https://usn.ubuntu.com/3620-2/"
2018-04-06 06:04:10 -04:00
} ,
{
"name" : "USN-3619-2" ,
"refsource" : "UBUNTU" ,
"url" : "https://usn.ubuntu.com/3619-2/"
2018-04-24 06:05:21 -04:00
} ,
{
"name" : "USN-3632-1" ,
"refsource" : "UBUNTU" ,
"url" : "https://usn.ubuntu.com/3632-1/"
2018-02-09 18:03:45 -05:00
}
]
}
}