First published: Sun Jul 29 2018(Updated: )
A flaw was found in Linux Kernel in the ucma_leave_multicast() function in drivers/infiniband/core/ucma.c which allows to access a certain data structure after freeing it in ucma_process_join(). This allows an attacker to cause use-after-free bug and to induce kernel memory corruption, leading to a system crash or other unspecified impact. References: <a href="https://marc.info/?t=152787806300002&r=1&w=2">https://marc.info/?t=152787806300002&r=1&w=2</a> <a href="https://patchwork.kernel.org/patch/10444267/">https://patchwork.kernel.org/patch/10444267/</a> An upstream patch: <a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cb2595c1393b4a5211534e6f0a0fbad369e21ad8">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cb2595c1393b4a5211534e6f0a0fbad369e21ad8</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <4.18 | 4.18 |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.16-1 | |
Linux kernel | <=4.17.11 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Debian | =8.0 | |
Debian | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-14734 is classified as a high severity vulnerability due to its potential to cause kernel memory corruption.
To fix CVE-2018-14734, update the Linux kernel to one of the patched versions specified by your distribution.
CVE-2018-14734 affects multiple distributions including Red Hat, Debian, and Ubuntu.
CVE-2018-14734 is a use-after-free vulnerability that allows attackers to access freed memory, potentially leading to system crashes or arbitrary code execution.
Yes, CVE-2018-14734 can potentially be exploited remotely under certain conditions, allowing an attacker to affect the kernel.