In the tun subsystem in the Linux kernel before 4.13.14, devgetvalidname is not called before registernetdevice. This allows local users to cause a denial of service (NULL pointer dereference and panic) via an ioctl(TUNSETIFF) call with a dev name containing a / character. This is similar to CVE-2013-4343.
[
{
"id": "CVE-2018-7191-6f195832",
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"235587029230343230664091417517274363842",
"246987921503117822153102006533263022326",
"246590704337724202599073471830603348827",
"112413349115602312068316589229396848040"
]
},
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@0ad646c81b2182f7fa67ec0c8c825e0ee165696d",
"signature_type": "Line",
"target": {
"file": "include/linux/netdevice.h"
}
},
{
"id": "CVE-2018-7191-8e9708ea",
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"295695672638669417558027029567490279781",
"184157472252583263586284054248600101897",
"75312098984766150341181897472525254526",
"55323490587699806059282824782467854172"
]
},
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@0ad646c81b2182f7fa67ec0c8c825e0ee165696d",
"signature_type": "Line",
"target": {
"file": "drivers/net/tun.c"
}
},
{
"id": "CVE-2018-7191-9c5987d6",
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"187706912762959447375750583575914818270",
"333797075386777840256667626986481329197",
"299616857189603309211410352045577826750",
"283130914670105909272691935636982999817",
"288803051645276564160849132162820353367",
"311125827382452773797795822331453033893",
"55155552196407099421438149482564610317",
"137690586083564677043868642641485199186",
"156673386038991519211635594287712489207",
"262328029651102865789392549639580658871"
]
},
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@0ad646c81b2182f7fa67ec0c8c825e0ee165696d",
"signature_type": "Line",
"target": {
"file": "net/core/dev.c"
}
},
{
"id": "CVE-2018-7191-b1ac7056",
"signature_version": "v1",
"digest": {
"function_hash": "51209748265835818426933097036211726369",
"length": 379.0
},
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@0ad646c81b2182f7fa67ec0c8c825e0ee165696d",
"signature_type": "Function",
"target": {
"file": "net/core/dev.c",
"function": "dev_get_valid_name"
}
},
{
"id": "CVE-2018-7191-d53140b8",
"signature_version": "v1",
"digest": {
"function_hash": "243939270276084381898029271469898210241",
"length": 3198.0
},
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@0ad646c81b2182f7fa67ec0c8c825e0ee165696d",
"signature_type": "Function",
"target": {
"file": "drivers/net/tun.c",
"function": "tun_set_iff"
}
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-7191.json"