First published: Tue Sep 12 2017(Updated: )
A security flaw is present in nl80211_set_rekey_data() function in the Linux kernel since v3.1-rc1 through v4.13. This function does not check whether required attributes are present in a netlink request. This request can be issued by a user with CAP_NET_ADMIN privilege and may result in NULL dereference and a system crash. Vulnerability surface: An analysis shows that NL80211_CMD_SET_REKEY_OFFLOAD request should be issued for a WiFi interface connected to a wireless network. This means that an attacker should be a privileged user already or should be root in a user+net namespace to which a WiFi interface was moved from a main net namespace. We believe the later configuration to be unlikely. References: <a href="http://seclists.org/oss-sec/2017/q3/437">http://seclists.org/oss-sec/2017/q3/437</a> <a href="https://marc.info/?t=150525503100001&r=1&w=2">https://marc.info/?t=150525503100001&r=1&w=2</a> Suggested upstream patch: <a href="https://marc.info/?l=linux-wireless&m=150525493517953&w=2">https://marc.info/?l=linux-wireless&m=150525493517953&w=2</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux kernel | <=4.13.3 | |
Debian | =8.0 | |
Debian | =9.0 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =14.04 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.17-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-12153 has a severity rating that suggests it may lead to denial-of-service conditions due to a NULL dereference.
To fix CVE-2017-12153, update the Linux kernel to version 4.13.4 or later depending on your distribution's available package.
CVE-2017-12153 affects Linux kernel versions from 3.1-rc1 through 4.13.3 across various distributions.
A user with CAP_NET_ADMIN privileges can exploit CVE-2017-12153.
CVE-2017-12153 can cause system crashes or instability due to unexpected NULL pointer dereferencing.