CVE-2018-1130
Published: 10 May 2018
Linux kernel before version 4.16-rc7 is vulnerable to a null pointer dereference in dccp_write_xmit() function in net/dccp/output.c in that allows a local user to cause a denial of service by a number of certain crafted system calls.
From the Ubuntu Security Team
It was discovered that a null pointer dereference vulnerability existed in the DCCP protocol implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash).
Notes
Author | Note |
---|---|
sbeattie | Introduced in fix for CVE-2017-8824 |
Mitigation
Blacklist the dccp ipv[46] autoloading aliases by adding the following lines to /etc/modprobe.d/blacklist-dccp.conf: alias net-pf-2-proto-0-type-6 off alias net-pf-2-proto-33-type-6 off alias net-pf-10-proto-0-type-6 off alias net-pf-10-proto-33-type-6 off
Priority
Status
Package | Release | Status |
---|---|---|
linux Launchpad, Ubuntu, Debian |
trusty |
Released
(3.13.0-153.203)
|
xenial |
Released
(4.4.0-127.153)
|
|
artful |
Released
(4.13.0-46.51)
|
|
bionic |
Not vulnerable
(4.15.0-15.16)
|
|
upstream |
Released
(4.16~rc7)
|
|
Patches: Introduced by 69c64866ce072dea1d1e59a0d61e0f66c0dffb76 |
||
linux-lts-trusty Launchpad, Ubuntu, Debian |
trusty |
Does not exist
|
xenial |
Does not exist
|
|
artful |
Does not exist
|
|
bionic |
Does not exist
|
|
upstream |
Released
(4.16~rc7)
|
|
linux-goldfish Launchpad, Ubuntu, Debian |
trusty |
Does not exist
(trusty was ignored [abandoned])
|
xenial |
Ignored
(end of life, was needs-triage)
|
|
artful |
Does not exist
|
|
bionic |
Does not exist
|
|
upstream |
Released
(4.16~rc7)
|
|
linux-grouper Launchpad, Ubuntu, Debian |
trusty |
Does not exist
(trusty was ignored [abandoned])
|
xenial |
Does not exist
|
|
artful |
Does not exist
|
|
upstream |
Released
(4.16~rc7)
|
|
bionic |
Does not exist
|
|
linux-maguro Launchpad, Ubuntu, Debian |
trusty |
Does not exist
(trusty was ignored [abandoned])
|
xenial |
Does not exist
|
|
artful |
Does not exist
|
|
bionic |
Does not exist
|
|
upstream |
Released
(4.16~rc7)
|
|
linux-mako Launchpad, Ubuntu, Debian |
trusty |
Does not exist
(trusty was ignored [abandoned])
|
xenial |
Ignored
(abandoned)
|
|
artful |
Does not exist
|
|
bionic |
Does not exist
|
|
upstream |
Released
(4.16~rc7)
|
|
linux-flo Launchpad, Ubuntu, Debian |
trusty |
Does not exist
(trusty was ignored [abandoned])
|
artful |
Does not exist
|
|
upstream |
Released
(4.16~rc7)
|
|
bionic |
Does not exist
|
|
xenial |
Ignored
(abandoned)
|
|
linux-aws Launchpad, Ubuntu, Debian |
trusty |
Released
(4.4.0-1022.22)
|
xenial |
Released
(4.4.0-1060.69)
|
|
artful |
Does not exist
|
|
upstream |
Released
(4.16~rc7)
|
|
bionic |
Not vulnerable
(4.15.0-1003.3)
|
|
linux-azure Launchpad, Ubuntu, Debian |
trusty |
Not vulnerable
(4.15.0-1023.24~14.04.1)
|
xenial |
Released
(4.15.0-1013.13~16.04.2)
|
|
artful |
Does not exist
|
|
upstream |
Released
(4.16~rc7)
|
|
bionic |
Not vulnerable
(4.15.0-1004.4)
|
|
linux-euclid Launchpad, Ubuntu, Debian |
trusty |
Does not exist
|
xenial |
Ignored
(was needed ESM criteria)
|
|
artful |
Does not exist
|
|
upstream |
Released
(4.16~rc7)
|
|
bionic |
Does not exist
|
|
linux-hwe Launchpad, Ubuntu, Debian |
upstream |
Released
(4.16~rc7)
|
bionic |
Not vulnerable
|
|
artful |
Does not exist
|
|
trusty |
Does not exist
|
|
xenial |
Released
(4.15.0-24.26~16.04.1)
|
|
linux-hwe-edge Launchpad, Ubuntu, Debian |
bionic |
Released
(4.18.0-8.9~18.04.1)
|
artful |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Released
(4.16~rc7)
|
|
xenial |
Released
(4.15.0-24.26~16.04.1)
|
|
linux-gke Launchpad, Ubuntu, Debian |
upstream |
Released
(4.16~rc7)
|
bionic |
Does not exist
|
|
artful |
Does not exist
|
|
trusty |
Does not exist
|
|
xenial |
Ignored
(end of standard support, was needs-triage)
|
|
linux-gcp Launchpad, Ubuntu, Debian |
upstream |
Released
(4.16~rc7)
|
bionic |
Not vulnerable
(4.15.0-1003.3)
|
|
artful |
Does not exist
|
|
trusty |
Does not exist
|
|
xenial |
Released
(4.15.0-1014.14~16.04.1)
|
|
linux-kvm Launchpad, Ubuntu, Debian |
bionic |
Not vulnerable
(4.15.0-1004.4)
|
artful |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Released
(4.16~rc7)
|
|
xenial |
Released
(4.4.0-1026.31)
|
|
linux-lts-utopic Launchpad, Ubuntu, Debian |
artful |
Does not exist
|
bionic |
Does not exist
|
|
trusty |
Does not exist
(trusty was ignored [end of standard support])
|
|
upstream |
Released
(4.16~rc7)
|
|
xenial |
Does not exist
|
|
linux-lts-vivid Launchpad, Ubuntu, Debian |
artful |
Does not exist
|
bionic |
Does not exist
|
|
trusty |
Does not exist
(trusty was ignored [end of standard support])
|
|
upstream |
Released
(4.16~rc7)
|
|
xenial |
Does not exist
|
|
linux-lts-wily Launchpad, Ubuntu, Debian |
artful |
Does not exist
|
bionic |
Does not exist
|
|
trusty |
Does not exist
(trusty was ignored [end of standard support])
|
|
upstream |
Released
(4.16~rc7)
|
|
xenial |
Does not exist
|
|
linux-lts-xenial Launchpad, Ubuntu, Debian |
artful |
Does not exist
|
bionic |
Does not exist
|
|
trusty |
Released
(4.4.0-127.153~14.04.1)
|
|
upstream |
Released
(4.16~rc7)
|
|
xenial |
Does not exist
|
|
linux-manta Launchpad, Ubuntu, Debian |
artful |
Does not exist
|
bionic |
Does not exist
|
|
trusty |
Does not exist
(trusty was ignored [abandoned])
|
|
upstream |
Released
(4.16~rc7)
|
|
xenial |
Does not exist
|
|
linux-oem Launchpad, Ubuntu, Debian |
artful |
Does not exist
|
bionic |
Not vulnerable
(4.15.0-1002.3)
|
|
trusty |
Does not exist
|
|
upstream |
Released
(4.16~rc7)
|
|
xenial |
Released
(4.13.0-1031.35)
|
|
linux-raspi2 Launchpad, Ubuntu, Debian |
artful |
Released
(4.13.0-1023.24)
|
bionic |
Not vulnerable
(4.15.0-1006.7)
|
|
trusty |
Does not exist
|
|
upstream |
Released
(4.16~rc7)
|
|
xenial |
Released
(4.4.0-1090.98)
|
|
linux-snapdragon Launchpad, Ubuntu, Debian |
artful |
Released
(4.4.0-1093.98)
|
bionic |
Not vulnerable
|
|
trusty |
Does not exist
|
|
upstream |
Released
(4.16~rc7)
|
|
xenial |
Released
(4.4.0-1093.98)
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 5.5 |
Attack vector | Local |
Attack complexity | Low |
Privileges required | Low |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1130
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1130
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=67f93df79aeefc3add4e4b31a752600f834236e2
- https://marc.info/?l=linux-netdev&m=152036596825220&w=2
- https://syzkaller.appspot.com/bug?id=833568de043e0909b2aeaef7be136db39d21ba94
- https://ubuntu.com/security/notices/USN-3654-1
- https://ubuntu.com/security/notices/USN-3654-2
- https://ubuntu.com/security/notices/USN-3656-1
- https://ubuntu.com/security/notices/USN-3697-1
- https://ubuntu.com/security/notices/USN-3697-2
- https://ubuntu.com/security/notices/USN-3698-1
- https://ubuntu.com/security/notices/USN-3698-2
- NVD
- Launchpad
- Debian