Description
The nft_flush_table function in net/netfilter/nf_tables_api.c in the Linux kernel before 3.18.5 mishandles the interaction between cross-chain jumps and ruleset flushes, which allows local users to cause a denial of service (panic) by leveraging the CAP_NET_ADMIN capability.
References (8)
Core 8
Core References
Issue Tracking x_refsource_confirm
https://bugzilla.redhat.com/show_bug.cgi?id=1190966
Vendor Advisory x_refsource_confirm
https://github.com/torvalds/linux/commit/a2f18db0c68fec96631c10cad9384c196e9008ac
Vendor Advisory x_refsource_confirm
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a2f18db0c68fec96631c10cad9384c196e9008ac
Vendor Advisory vendor-advisory
x_refsource_redhat
http://rhn.redhat.com/errata/RHSA-2015-1138.html
Vendor Advisory x_refsource_confirm
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.18.5
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/72552
Mailing List mailing-list
x_refsource_mlist
http://www.openwall.com/lists/oss-security/2015/02/10/13
Vendor Advisory vendor-advisory
x_refsource_redhat
http://rhn.redhat.com/errata/RHSA-2015-1137.html
Scores
CVSS v3
5.5
EPSS
0.0004
EPSS Percentile
12.7%
Attack Vector
LOCAL
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Details
CWE
CWE-19
Status
published
Products (1)
linux/linux_kernel
< 3.18.4
Published
May 02, 2016
Tracked Since
Feb 18, 2026