Bug 1622004 (CVE-2018-14619) - CVE-2018-14619 kernel: crash (possible privesc) in kernel crypto api.
Summary: CVE-2018-14619 kernel: crash (possible privesc) in kernel crypto api.
Alias: CVE-2018-14619
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
Depends On: 1600394 1622435 1622436 1622836 1623767
Blocks: 1615186
TreeView+ depends on / blocked
Reported: 2018-08-24 06:38 UTC by Wade Mealing
Modified: 2021-02-16 23:09 UTC (History)
40 users (show)

Fixed In Version: kernel-4.15-rc4
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in the crypto subsystem that allowed an attacker to crash the system or possibly escalate privileges with a specially crafted program.
Clone Of:
Last Closed: 2019-06-10 10:36:52 UTC

Attachments (Terms of Use)

System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2018:2948 0 None None None 2018-10-30 09:05:06 UTC

Description Wade Mealing 2018-08-24 06:38:31 UTC
A flaw was found in the crypto subsystem of the Linux kernel.

The "null skcipher" was being by dropped in the wrong place -- when each af_alg_ctx was freed instead of when the aead_tfm was freed. This can cause the null skcipher to be freed while it is still in use.

This may grant a local user to be able to crash the machine and possible corrupt memory leading to privilege escalation.

Upstream patch:


Comment 6 Wade Mealing 2018-08-28 07:31:58 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 1622836]

Comment 7 Justin M. Forbes 2018-08-28 12:12:15 UTC
This issue was fixed for Fedora with the 4.14.8 stable kernel update.

Comment 8 Petr Matousek 2018-10-17 14:04:59 UTC

Name: Florian Weimer (Red Hat), Ondrej Mosnacek (Red Hat)

Comment 9 errata-xmlrpc 2018-10-30 09:04:45 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2018:2948 https://access.redhat.com/errata/RHSA-2018:2948

Note You need to log in before you can comment on or make changes to this bug.