Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1551985 - (CVE-2017-18218) CVE-2017-18218 kernel: Use-after-free vulnerability in drivers/net/ethernet/hisilicon/hns/hns_enet.c allows local attacker to cause denial of service
CVE-2017-18218 kernel: Use-after-free vulnerability in drivers/net/ethernet/h...
Status: CLOSED NOTABUG
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20170706,repor...
: Security
Depends On: 1474620
Blocks: 1551989
  Show dependency treegraph
 
Reported: 2018-03-06 04:53 EST by Adam Mariš
Modified: 2018-03-13 12:13 EDT (History)
46 users (show)

See Also:
Fixed In Version: kernel 4.13
Doc Type: If docs needed, set a value
Doc Text:
In drivers/net/ethernet/hisilicon/hns/hns_enet.c in the Linux kernel, before 4.13, local users can cause a denial of service (use-after-free and BUG) or possibly have unspecified other impact by leveraging differences in skb handling between hns_nic_net_xmit_hw and hns_nic_net_xmit.
Story Points: ---
Clone Of:
Environment:
Last Closed: 2018-03-07 09:57:37 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Adam Mariš 2018-03-06 04:53:19 EST
In drivers/net/ethernet/hisilicon/hns/hns_enet.c in the Linux kernel before 4.13, local users can cause a denial of service (use-after-free and BUG) or possibly have unspecified other impact by leveraging differences in skb handling between hns_nic_net_xmit_hw and hns_nic_net_xmit.

References:

https://marc.info/?t=149930604200001&r=1&w=2

An upstream patch:

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=27463ad99f738ed93c7c8b3e2e5bc8c4853a2ff2

Note You need to log in before you can comment on or make changes to this bug.