Description
A use-after-free vulnerability was found in network namespaces code affecting the Linux kernel before 4.14.11. The function get_net_ns_by_id() in net/core/net_namespace.c does not check for the net::count value after it has found a peer network in netns_ids idr, which could lead to double free and memory corruption. This vulnerability could allow an unprivileged local user to induce kernel memory corruption on the system, leading to a crash. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although it is thought to be unlikely.
Published: 2018-01-09
Score: 4.7 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Ubuntu USN Ubuntu USN USN-3617-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-3617-2 Linux (HWE) vulnerabilities
Ubuntu USN Ubuntu USN USN-3617-3 Linux kernel (Raspberry Pi 2) vulnerabilities
Ubuntu USN Ubuntu USN USN-3619-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-3619-2 Linux kernel (Xenial HWE) vulnerabilities
Ubuntu USN Ubuntu USN USN-3632-1 Linux kernel (Azure) vulnerabilities
History

No history.

Subscriptions

Canonical Ubuntu Linux
Fedoraproject Fedora
Linux Linux Kernel
Redhat Enterprise Linux Enterprise Linux Compute Node Eus Enterprise Linux Desktop Enterprise Linux Eus Enterprise Linux For Ibm Z Systems Enterprise Linux For Ibm Z Systems Eus Enterprise Linux For Power Big Endian Enterprise Linux For Power Big Endian Eus Enterprise Linux For Power Little Endian Eus Enterprise Linux For Real Time Enterprise Linux For Real Time For Nfv Enterprise Linux For Scientific Computing Enterprise Linux Server Enterprise Linux Server Aus Enterprise Linux Server Tus Enterprise Linux Server Update Services For Sap Solutions Enterprise Linux Workstation Rhel Eus Rhel Extras Rt
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-05T19:50:15.698Z

Reserved: 2017-10-08T00:00:00.000Z

Link: CVE-2017-15129

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-01-09T19:29:00.217

Modified: 2024-11-21T03:14:07.713

Link: CVE-2017-15129

cve-icon Redhat

Severity : Moderate

Publid Date: 2017-12-19T00:00:00Z

Links: CVE-2017-15129 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses