Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-12153

Опубликовано: 21 сент. 2017
Источник: debian
EPSS Низкий

Описание

A security flaw was discovered in the nl80211_set_rekey_data() function in net/wireless/nl80211.c in the Linux kernel through 4.13.3. This function does not check whether the required attributes are present in a Netlink request. This request can be issued by a user with the CAP_NET_ADMIN capability and may result in a NULL pointer dereference and system crash.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed4.12.13-1package

Примечания

  • https://marc.info/?t=150525503100001&r=1&w=2

  • https://marc.info/?l=linux-wireless&m=150525493517953&w=2

EPSS

Процентиль: 10%
0.00037
Низкий

Связанные уязвимости

CVSS3: 4.4
ubuntu
почти 8 лет назад

A security flaw was discovered in the nl80211_set_rekey_data() function in net/wireless/nl80211.c in the Linux kernel through 4.13.3. This function does not check whether the required attributes are present in a Netlink request. This request can be issued by a user with the CAP_NET_ADMIN capability and may result in a NULL pointer dereference and system crash.

CVSS3: 4.4
redhat
почти 8 лет назад

A security flaw was discovered in the nl80211_set_rekey_data() function in net/wireless/nl80211.c in the Linux kernel through 4.13.3. This function does not check whether the required attributes are present in a Netlink request. This request can be issued by a user with the CAP_NET_ADMIN capability and may result in a NULL pointer dereference and system crash.

CVSS3: 4.4
nvd
почти 8 лет назад

A security flaw was discovered in the nl80211_set_rekey_data() function in net/wireless/nl80211.c in the Linux kernel through 4.13.3. This function does not check whether the required attributes are present in a Netlink request. This request can be issued by a user with the CAP_NET_ADMIN capability and may result in a NULL pointer dereference and system crash.

CVSS3: 4.4
github
около 3 лет назад

A security flaw was discovered in the nl80211_set_rekey_data() function in net/wireless/nl80211.c in the Linux kernel through 4.13.3. This function does not check whether the required attributes are present in a Netlink request. This request can be issued by a user with the CAP_NET_ADMIN capability and may result in a NULL pointer dereference and system crash.

oracle-oval
больше 6 лет назад

ELSA-2019-4531: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS

Процентиль: 10%
0.00037
Низкий