CVE-2018-1065 PUBLISHED

The netfilter subsystem in the Linux kernel through 4.15.7 mishandles the case of a rule blob that contains a jump but lacks a user-defined chain, which allows local users to cause a denial of service (NULL pointer dereference) by leveraging the CAP_NET_RAW or CAP_NET_ADMIN capability, related to arpt_do_table in net/ipv4/netfilter/arp_tables.c, ipt_do_table in net/ipv4/netfilter/ip_tables.c, and ip6t_do_table in net/ipv6/netfilter/ip6_tables.c.

EPSS 0.08% · 24.4th percentile

Risk Scores

EPSS Score
0.08%
24.4th percentile

Affected Products

VendorProductVersions
Ubuntu:14.04:LTSlinux-lts-xenial4.4.0-72.93~14.04.1, 4.4.0-28.47~14.04.1, 4.4.0-31.50~14.04.1
Ubuntu:16.04:LTSlinux-aws4.4.0-1044.53, 0, 4.4.0-1001.10
Ubuntu:16.04:LTSlinux4.4.0-13.29, 0, 4.2.0-16.19
Ubuntu:16.04:LTSlinux-kvm0, 4.4.0-1023.28, 4.4.0-1021.26
Ubuntu:20.04:LTSlinux-gke5.4.0-1074.79, 5.4.0-1105.112, 5.4.0-1104.111
Ubuntu:22.04:LTSlinux-realtime0, 5.15.0-1032.35
Ubuntu:16.04:LTSlinux-raspi20, 4.2.0-1013.19, 4.2.0-1014.21
Ubuntu:14.04:LTSlinux-aws4.4.0-1012.12, 4.4.0-1014.14, 4.4.0-1016.16
Ubuntu:20.04:LTSlinux-raspi25.3.0-1014.16, 0, 5.4.0-1006.6
Ubuntu:16.04:LTSlinux-snapdragon4.4.0-1090.95, 4.4.0-1088.93, 4.4.0-1087.92
Ubuntu:20.04:LTSlinux-azure-fde5.4.0-1070.73+cvm1.1, 0, 5.4.0-1063.66+cvm2.2
Ubuntu:20.04:LTSlinux-riscv5.4.0-37.42, 5.4.0-40.45, 5.4.0-39.44
Ubuntu:16.04:LTSlinux-hwe4.10.0-38.42~16.04.1, 4.10.0-37.41~16.04.1, 4.10.0-35.39~16.04.1
Ubuntu:16.04:LTSlinux-azure4.13.0-1016.19, 4.13.0-1018.21, 4.13.0-1014.17
Ubuntu:22.04:LTSlinux-riscv5.15.0-1022.26, 0, 5.15.0-1012.13
Ubuntu:24.04:LTSlinux-raspi-realtime6.8.0-2019.20, 0
Ubuntu:22.04:LTSlinux-intel-iot-realtime0, 5.15.0-1073.75
Ubuntu:Pro:FIPS:16.04:LTSlinux-fips4.4.0-1003.3, 4.4.0-1005.5, 4.4.0-1006.6
Ubuntu:16.04:LTSlinux-gcp4.13.0-1019.23, 4.10.0-1009.9, 4.10.0-1008.8

Timeline

References

Open in Interactive Console →