First published: Tue Dec 19 2017(Updated: )
A NULL pointer dereference was found in net/rds/rdma.c:__rds_rdma_map() function in the Linux kernel allowing local attackers to cause a system panic and a denial-of-service. References: <a href="https://patchwork.kernel.org/patch/10096441/">https://patchwork.kernel.org/patch/10096441/</a> <a href="https://xorl.wordpress.com/2017/12/18/linux-kernel-rdma-null-pointer-dereference/">https://xorl.wordpress.com/2017/12/18/linux-kernel-rdma-null-pointer-dereference/</a> <a href="http://seclists.org/oss-sec/2018/q1/191">http://seclists.org/oss-sec/2018/q1/191</a> An upstream patch: <a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f3069c6d33f6ae63a1668737bc78aaaa51bff7ca">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f3069c6d33f6ae63a1668737bc78aaaa51bff7ca</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <4.14.7 | |
Debian GNU/Linux | =7.0 | |
Debian GNU/Linux | =8.0 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =17.10 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.16-1 | |
Linux kernel | <4.14.7 | |
Debian | =7.0 | |
Debian | =8.0 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =17.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-7492 has a high severity rating due to its potential to cause a denial-of-service through a system crash.
To fix CVE-2018-7492, update to a kernel version that is not affected, specifically versions later than 4.14.7.
CVE-2018-7492 affects Linux kernel versions up to 4.14.7 and specific Debian and Ubuntu releases.
CVE-2018-7492 allows local attackers to cause a system panic, resulting in a denial-of-service.
Yes, patches are available for CVE-2018-7492 in the form of updated kernel releases for affected systems.