The Linux kernel at version 4.15.0-rc9 is vulnerable to a NULL pointer dereference ip6_tables.c:ip6t_do_table() leading to a crash. This vulnerability is only present under certain malformed iptables rulesets. Inserting malformed rules its a privileged operation as root or a user with CAP_NET_RAW,CAP_NET_ADMIN capabilities ( see man setcap(8) ). As this requires advanced privileges Red Hat Product Security has rated this flaw as moderate. Additional References: Netdev list: http://lists.openwall.net/netdev/2018/01/27/46 A suggested upstream patch: http://patchwork.ozlabs.org/patch/870355/ An upstream patch: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=57ebd808a97d7
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1547831]
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2018:2948 https://access.redhat.com/errata/RHSA-2018:2948