Описание
The mq_notify function in the Linux kernel through 4.11.9 does not set the sock pointer to NULL upon entry into the retry logic. During a user-space close of a Netlink socket, it allows attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact.
A use-after-free flaw was found in the Netlink functionality of the Linux kernel networking subsystem. Due to the insufficient cleanup in the mq_notify function, a local attacker could potentially use this flaw to escalate their privileges on the system.
Отчет
This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5,6,7 and MRG-2. Future Linux kernel updates for the respective releases may address this issue.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 7 | kernel-alt | Affected | ||
Red Hat Enterprise Linux 5 Extended Lifecycle Support | kernel | Fixed | RHSA-2018:3822 | 13.12.2018 |
Red Hat Enterprise Linux 6 | kernel | Fixed | RHSA-2018:0169 | 25.01.2018 |
Red Hat Enterprise Linux 7 | kernel-rt | Fixed | RHSA-2017:2931 | 19.10.2017 |
Red Hat Enterprise Linux 7 | kernel | Fixed | RHSA-2017:2930 | 19.10.2017 |
Red Hat Enterprise MRG 2 | kernel-rt | Fixed | RHSA-2017:2918 | 19.10.2017 |
Показывать по
Дополнительная информация
Статус:
EPSS
7.8 High
CVSS3
Связанные уязвимости
The mq_notify function in the Linux kernel through 4.11.9 does not set the sock pointer to NULL upon entry into the retry logic. During a user-space close of a Netlink socket, it allows attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact.
The mq_notify function in the Linux kernel through 4.11.9 does not set the sock pointer to NULL upon entry into the retry logic. During a user-space close of a Netlink socket, it allows attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact.
The mq_notify function in the Linux kernel through 4.11.9 does not set ...
The mq_notify function in the Linux kernel through 4.11.9 does not set the sock pointer to NULL upon entry into the retry logic. During a user-space close of a Netlink socket, it allows attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact.
Уязвимость функции mq_notify операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие
EPSS
7.8 High
CVSS3