A flaw was found in the crypto subsystem of the Linux kernel before version kernel-4.15-rc4. The "null skcipher" was being dropped when each af_alg_ctx was freed instead of when the aead_tfm was freed. This can cause the null skcipher to be freed while it is still in use leading to a local user being able to crash the system or possibly escalate privileges.
http://www.securityfocus.com/bid/105200
https://access.redhat.com/errata/RHSA-2018:2948
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14619
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0013
Source: MITRE
Published: 2018-08-30
Updated: 2019-10-09
Type: CWE-20
Base Score: 7.2
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact Score: 10
Exploitability Score: 3.9
Severity: HIGH
Base Score: 7.8
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Impact Score: 5.9
Exploitability Score: 1.8
Severity: HIGH