A flaw was found in the crypto subsystem of the Linux kernel before version kernel-4.15-rc4. The "null skcipher" was being dropped when each afalgctx was freed instead of when the aead_tfm was freed. This can cause the null skcipher to be freed while it is still in use leading to a local user being able to crash the system or possibly escalate privileges.
[
{
"events": [
{
"introduced": "4.14"
},
{
"fixed": "4.14.8"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.15-rc1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.15-rc2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.15-rc3"
}
]
}
]
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-14619.json"