Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-18559

Опубликовано: 15 июн. 2018
Источник: redhat
CVSS3: 7
EPSS Низкий

Описание

In the Linux kernel through 4.19, a use-after-free can occur due to a race condition between fanout_add from setsockopt and bind on an AF_PACKET socket. This issue exists because of the 15fe076edea787807a7cdc168df832544b58eba6 incomplete fix for a race condition. The code mishandles a certain multithreaded case involving a packet_do_bind unregister action followed by a packet_notifier register action. Later, packet_release operates on only one of the two applicable linked lists. The attacker can achieve Program Counter control.

A use-after-free flaw can occur in the Linux kernel due to a race condition between packet_do_bind() and packet_notifier() functions called for an AF_PACKET socket. An unprivileged, local user could use this flaw to induce kernel memory corruption on the system, leading to an unresponsive system or to a crash. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5kernelNot affected
Red Hat Enterprise Linux 6kernelNot affected
Red Hat Enterprise Linux 8kernelNot affected
Red Hat Enterprise Linux 8kernel-rtNot affected
Red Hat Enterprise Linux 7kernel-rtFixedRHSA-2019:018829.01.2019
Red Hat Enterprise Linux 7kernelFixedRHSA-2019:016329.01.2019
Red Hat Enterprise Linux 7kernel-altFixedRHSA-2020:017421.01.2020
Red Hat Enterprise Linux 7.3 Advanced Update SupportkernelFixedRHSA-2019:415910.12.2019
Red Hat Enterprise Linux 7.3 Telco Extended Update SupportkernelFixedRHSA-2019:415910.12.2019
Red Hat Enterprise Linux 7.3 Update Services for SAP SolutionskernelFixedRHSA-2019:415910.12.2019

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-416
https://bugzilla.redhat.com/show_bug.cgi?id=1641878kernel: Use-after-free due to race condition in AF_PACKET implementation

EPSS

Процентиль: 78%
0.01207
Низкий

7 High

CVSS3

Связанные уязвимости

CVSS3: 8.1
ubuntu
больше 6 лет назад

In the Linux kernel through 4.19, a use-after-free can occur due to a race condition between fanout_add from setsockopt and bind on an AF_PACKET socket. This issue exists because of the 15fe076edea787807a7cdc168df832544b58eba6 incomplete fix for a race condition. The code mishandles a certain multithreaded case involving a packet_do_bind unregister action followed by a packet_notifier register action. Later, packet_release operates on only one of the two applicable linked lists. The attacker can achieve Program Counter control.

CVSS3: 8.1
nvd
больше 6 лет назад

In the Linux kernel through 4.19, a use-after-free can occur due to a race condition between fanout_add from setsockopt and bind on an AF_PACKET socket. This issue exists because of the 15fe076edea787807a7cdc168df832544b58eba6 incomplete fix for a race condition. The code mishandles a certain multithreaded case involving a packet_do_bind unregister action followed by a packet_notifier register action. Later, packet_release operates on only one of the two applicable linked lists. The attacker can achieve Program Counter control.

CVSS3: 8.1
debian
больше 6 лет назад

In the Linux kernel through 4.19, a use-after-free can occur due to a ...

CVSS3: 8.1
github
около 3 лет назад

In the Linux kernel through 4.19, a use-after-free can occur due to a race condition between fanout_add from setsockopt and bind on an AF_PACKET socket. This issue exists because of the 15fe076edea787807a7cdc168df832544b58eba6 incomplete fix for a race condition. The code mishandles a certain multithreaded case involving a packet_do_bind unregister action followed by a packet_notifier register action. Later, packet_release operates on only one of the two applicable linked lists. The attacker can achieve Program Counter control.

CVSS3: 8.1
fstec
больше 7 лет назад

Уязвимость обработчика RAW-сокетов AF_PACKET ядра Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 78%
0.01207
Низкий

7 High

CVSS3