First published: Wed May 09 2018(Updated: )
A null pointer dereference in dccp_write_xmit() function in net/dccp/output.c in the Linux kernel allows a local user to cause a denial of service by a number of certain crafted system calls. References: <a href="https://syzkaller.appspot.com/bug?id=833568de043e0909b2aeaef7be136db39d21ba94">https://syzkaller.appspot.com/bug?id=833568de043e0909b2aeaef7be136db39d21ba94</a> <a href="https://marc.info/?t=152036611500003&r=1&w=2">https://marc.info/?t=152036611500003&r=1&w=2</a> <a href="http://seclists.org/oss-sec/2018/q2/100">http://seclists.org/oss-sec/2018/q2/100</a> An upstream patch: <a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=67f93df79aeefc3add4e4b31a752600f834236e2">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=67f93df79aeefc3add4e4b31a752600f834236e2</a>
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | <4.16 | |
Linux Linux kernel | =4.16-rc1 | |
Linux Linux kernel | =4.16-rc2 | |
Linux Linux kernel | =4.16-rc3 | |
Linux Linux kernel | =4.16-rc4 | |
Linux Linux kernel | =4.16-rc5 | |
Linux Linux kernel | =4.16-rc6 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Workstation | =7.0 | |
redhat/kernel | <4.16 | 4.16 |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.11.10-1 6.12.5-1 |
Blacklist the dccp ipv[46] autoloading aliases by adding the following lines to /etc/modprobe.d/blacklist-dccp.conf: alias net-pf-2-proto-0-type-6 off alias net-pf-2-proto-33-type-6 off alias net-pf-10-proto-0-type-6 off alias net-pf-10-proto-33-type-6 off
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1130 is a vulnerability in the Linux kernel that allows a local user to cause a denial of service.
CVE-2018-1130 has a severity level of medium.
Linux kernel versions 3.13.0-153.203, 4.4.0-127.153, 4.13.0-46.51, and 4.16~ are affected by CVE-2018-1130.
To fix CVE-2018-1130, you should update your Linux kernel to version 4.16 or higher.
You can find more information about CVE-2018-1130 on the following references: [link1](https://marc.info/?l=linux-netdev&m=152036596825220&w=2), [link2](https://syzkaller.appspot.com/bug?id=833568de043e0909b2aeaef7be136db39d21ba94), [link3](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1130).