{ "CVE_data_meta" : { "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2018-1065", "STATE" : "PUBLIC" }, "affects" : { "vendor" : { "vendor_data" : [ { "product" : { "product_data" : [ { "product_name" : "Linux kernel 4.15.0-rc9", "version" : { "version_data" : [ { "version_value" : "Linux kernel 4.15.0-rc9" } ] } } ] }, "vendor_name" : "n/a" } ] } }, "data_format" : "MITRE", "data_type" : "CVE", "data_version" : "4.0", "description" : { "description_data" : [ { "lang" : "eng", "value" : "The netfilter subsystem in the Linux kernel through 4.15.7 mishandles the case of a rule blob that contains a jump but lacks a user-defined chain, which allows local users to cause a denial of service (NULL pointer dereference) by leveraging the CAP_NET_RAW or CAP_NET_ADMIN capability, related to arpt_do_table in net/ipv4/netfilter/arp_tables.c, ipt_do_table in net/ipv4/netfilter/ip_tables.c, and ip6t_do_table in net/ipv6/netfilter/ip6_tables.c." } ] }, "problemtype" : { "problemtype_data" : [ { "description" : [ { "lang" : "eng", "value" : "NULL pointer dereference" } ] } ] }, "references" : { "reference_data" : [ { "name" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=57ebd808a97d7c5b1e1afb937c2db22beba3c1f8", "refsource" : "MISC", "url" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=57ebd808a97d7c5b1e1afb937c2db22beba3c1f8" }, { "name" : "http://lists.openwall.net/netdev/2018/01/27/46", "refsource" : "MISC", "url" : "http://lists.openwall.net/netdev/2018/01/27/46" }, { "name" : "http://patchwork.ozlabs.org/patch/870355/", "refsource" : "MISC", "url" : "http://patchwork.ozlabs.org/patch/870355/" }, { "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1547824", "refsource" : "MISC", "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1547824" }, { "name" : "https://github.com/torvalds/linux/commit/57ebd808a97d7c5b1e1afb937c2db22beba3c1f8", "refsource" : "MISC", "url" : "https://github.com/torvalds/linux/commit/57ebd808a97d7c5b1e1afb937c2db22beba3c1f8" }, { "name" : "DSA-4188", "refsource" : "DEBIAN", "url" : "https://www.debian.org/security/2018/dsa-4188" }, { "name" : "RHSA-2018:2948", "refsource" : "REDHAT", "url" : "https://access.redhat.com/errata/RHSA-2018:2948" }, { "name" : "USN-3654-1", "refsource" : "UBUNTU", "url" : "https://usn.ubuntu.com/3654-1/" }, { "name" : "USN-3654-2", "refsource" : "UBUNTU", "url" : "https://usn.ubuntu.com/3654-2/" }, { "name" : "USN-3656-1", "refsource" : "UBUNTU", "url" : "https://usn.ubuntu.com/3656-1/" }, { "name" : "1040446", "refsource" : "SECTRACK", "url" : "http://www.securitytracker.com/id/1040446" } ] } }