A use-after-free vulnerability was found in network namespaces code affecting the Linux kernel before 4.14.11. The function get_net_ns_by_id() in net/core/net_namespace.c does not check for the net::count value after it has found a peer network in netns_ids idr, which could lead to double free and memory corruption. This vulnerability could allow an unprivileged local user to induce kernel memory corruption on the system, leading to a crash. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although it is thought to be unlikely.
4.4.0-1016.164.4.0-119.143~14.04.14.4.0-119.1434.4.0-1054.634.13.0-1014.174.13.0-1012.164.13.0-41.46~16.04.14.4.0-1020.254.13.0-1022.244.4.0-1086.94Exploitability
AV:LAC:HPR:LUI:NScope
S:UImpact
C:NI:NA:HCVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H