Логотип exploitDog
bind:"CVE-2018-18397" OR bind:"CVE-2018-18559"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2018-18397" OR bind:"CVE-2018-18559"

Количество 21

Количество 21

oracle-oval логотип

ELSA-2019-0163

больше 6 лет назад

ELSA-2019-0163: kernel security, bug fix, and enhancement update (IMPORTANT)

EPSS: Низкий
ubuntu логотип

CVE-2018-18559

больше 6 лет назад

In the Linux kernel through 4.19, a use-after-free can occur due to a race condition between fanout_add from setsockopt and bind on an AF_PACKET socket. This issue exists because of the 15fe076edea787807a7cdc168df832544b58eba6 incomplete fix for a race condition. The code mishandles a certain multithreaded case involving a packet_do_bind unregister action followed by a packet_notifier register action. Later, packet_release operates on only one of the two applicable linked lists. The attacker can achieve Program Counter control.

CVSS3: 8.1
EPSS: Низкий
redhat логотип

CVE-2018-18559

около 7 лет назад

In the Linux kernel through 4.19, a use-after-free can occur due to a race condition between fanout_add from setsockopt and bind on an AF_PACKET socket. This issue exists because of the 15fe076edea787807a7cdc168df832544b58eba6 incomplete fix for a race condition. The code mishandles a certain multithreaded case involving a packet_do_bind unregister action followed by a packet_notifier register action. Later, packet_release operates on only one of the two applicable linked lists. The attacker can achieve Program Counter control.

CVSS3: 7
EPSS: Низкий
nvd логотип

CVE-2018-18559

больше 6 лет назад

In the Linux kernel through 4.19, a use-after-free can occur due to a race condition between fanout_add from setsockopt and bind on an AF_PACKET socket. This issue exists because of the 15fe076edea787807a7cdc168df832544b58eba6 incomplete fix for a race condition. The code mishandles a certain multithreaded case involving a packet_do_bind unregister action followed by a packet_notifier register action. Later, packet_release operates on only one of the two applicable linked lists. The attacker can achieve Program Counter control.

CVSS3: 8.1
EPSS: Низкий
debian логотип

CVE-2018-18559

больше 6 лет назад

In the Linux kernel through 4.19, a use-after-free can occur due to a ...

CVSS3: 8.1
EPSS: Низкий
ubuntu логотип

CVE-2018-18397

больше 6 лет назад

The userfaultfd implementation in the Linux kernel before 4.19.7 mishandles access control for certain UFFDIO_ ioctl calls, as demonstrated by allowing local users to write data into holes in a tmpfs file (if the user has read-only access to that file, and that file contains holes), related to fs/userfaultfd.c and mm/userfaultfd.c.

CVSS3: 5.5
EPSS: Низкий
redhat логотип

CVE-2018-18397

больше 6 лет назад

The userfaultfd implementation in the Linux kernel before 4.19.7 mishandles access control for certain UFFDIO_ ioctl calls, as demonstrated by allowing local users to write data into holes in a tmpfs file (if the user has read-only access to that file, and that file contains holes), related to fs/userfaultfd.c and mm/userfaultfd.c.

CVSS3: 6.1
EPSS: Низкий
nvd логотип

CVE-2018-18397

больше 6 лет назад

The userfaultfd implementation in the Linux kernel before 4.19.7 mishandles access control for certain UFFDIO_ ioctl calls, as demonstrated by allowing local users to write data into holes in a tmpfs file (if the user has read-only access to that file, and that file contains holes), related to fs/userfaultfd.c and mm/userfaultfd.c.

CVSS3: 5.5
EPSS: Низкий
debian логотип

CVE-2018-18397

больше 6 лет назад

The userfaultfd implementation in the Linux kernel before 4.19.7 misha ...

CVSS3: 5.5
EPSS: Низкий
github логотип

GHSA-8w88-57v8-p48h

около 3 лет назад

In the Linux kernel through 4.19, a use-after-free can occur due to a race condition between fanout_add from setsockopt and bind on an AF_PACKET socket. This issue exists because of the 15fe076edea787807a7cdc168df832544b58eba6 incomplete fix for a race condition. The code mishandles a certain multithreaded case involving a packet_do_bind unregister action followed by a packet_notifier register action. Later, packet_release operates on only one of the two applicable linked lists. The attacker can achieve Program Counter control.

CVSS3: 8.1
EPSS: Низкий
fstec логотип

BDU:2019-00974

больше 7 лет назад

Уязвимость обработчика RAW-сокетов AF_PACKET ядра Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

CVSS3: 8.1
EPSS: Низкий
github логотип

GHSA-7cx6-7887-9rwv

около 3 лет назад

The userfaultfd implementation in the Linux kernel before 4.19.7 mishandles access control for certain UFFDIO_ ioctl calls, as demonstrated by allowing local users to write data into holes in a tmpfs file (if the user has read-only access to that file, and that file contains holes), related to fs/userfaultfd.c and mm/userfaultfd.c.

CVSS3: 5.5
EPSS: Низкий
fstec логотип

BDU:2020-00620

больше 6 лет назад

Уязвимость компонента userfaultfd ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на целостность защищаемой информации

CVSS3: 5.5
EPSS: Низкий
oracle-oval логотип

ELSA-2019-4528

больше 6 лет назад

ELSA-2019-4528: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2019-4541

больше 6 лет назад

ELSA-2019-4541: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2019-4575

больше 6 лет назад

ELSA-2019-4575: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:0196-1

больше 6 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2019:0065-1

около 6 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:0150-1

больше 6 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:0224-1

больше 6 лет назад

Security update for the Linux Kernel

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2019-0163

ELSA-2019-0163: kernel security, bug fix, and enhancement update (IMPORTANT)

больше 6 лет назад
ubuntu логотип
CVE-2018-18559

In the Linux kernel through 4.19, a use-after-free can occur due to a race condition between fanout_add from setsockopt and bind on an AF_PACKET socket. This issue exists because of the 15fe076edea787807a7cdc168df832544b58eba6 incomplete fix for a race condition. The code mishandles a certain multithreaded case involving a packet_do_bind unregister action followed by a packet_notifier register action. Later, packet_release operates on only one of the two applicable linked lists. The attacker can achieve Program Counter control.

CVSS3: 8.1
1%
Низкий
больше 6 лет назад
redhat логотип
CVE-2018-18559

In the Linux kernel through 4.19, a use-after-free can occur due to a race condition between fanout_add from setsockopt and bind on an AF_PACKET socket. This issue exists because of the 15fe076edea787807a7cdc168df832544b58eba6 incomplete fix for a race condition. The code mishandles a certain multithreaded case involving a packet_do_bind unregister action followed by a packet_notifier register action. Later, packet_release operates on only one of the two applicable linked lists. The attacker can achieve Program Counter control.

CVSS3: 7
1%
Низкий
около 7 лет назад
nvd логотип
CVE-2018-18559

In the Linux kernel through 4.19, a use-after-free can occur due to a race condition between fanout_add from setsockopt and bind on an AF_PACKET socket. This issue exists because of the 15fe076edea787807a7cdc168df832544b58eba6 incomplete fix for a race condition. The code mishandles a certain multithreaded case involving a packet_do_bind unregister action followed by a packet_notifier register action. Later, packet_release operates on only one of the two applicable linked lists. The attacker can achieve Program Counter control.

CVSS3: 8.1
1%
Низкий
больше 6 лет назад
debian логотип
CVE-2018-18559

In the Linux kernel through 4.19, a use-after-free can occur due to a ...

CVSS3: 8.1
1%
Низкий
больше 6 лет назад
ubuntu логотип
CVE-2018-18397

The userfaultfd implementation in the Linux kernel before 4.19.7 mishandles access control for certain UFFDIO_ ioctl calls, as demonstrated by allowing local users to write data into holes in a tmpfs file (if the user has read-only access to that file, and that file contains holes), related to fs/userfaultfd.c and mm/userfaultfd.c.

CVSS3: 5.5
0%
Низкий
больше 6 лет назад
redhat логотип
CVE-2018-18397

The userfaultfd implementation in the Linux kernel before 4.19.7 mishandles access control for certain UFFDIO_ ioctl calls, as demonstrated by allowing local users to write data into holes in a tmpfs file (if the user has read-only access to that file, and that file contains holes), related to fs/userfaultfd.c and mm/userfaultfd.c.

CVSS3: 6.1
0%
Низкий
больше 6 лет назад
nvd логотип
CVE-2018-18397

The userfaultfd implementation in the Linux kernel before 4.19.7 mishandles access control for certain UFFDIO_ ioctl calls, as demonstrated by allowing local users to write data into holes in a tmpfs file (if the user has read-only access to that file, and that file contains holes), related to fs/userfaultfd.c and mm/userfaultfd.c.

CVSS3: 5.5
0%
Низкий
больше 6 лет назад
debian логотип
CVE-2018-18397

The userfaultfd implementation in the Linux kernel before 4.19.7 misha ...

CVSS3: 5.5
0%
Низкий
больше 6 лет назад
github логотип
GHSA-8w88-57v8-p48h

In the Linux kernel through 4.19, a use-after-free can occur due to a race condition between fanout_add from setsockopt and bind on an AF_PACKET socket. This issue exists because of the 15fe076edea787807a7cdc168df832544b58eba6 incomplete fix for a race condition. The code mishandles a certain multithreaded case involving a packet_do_bind unregister action followed by a packet_notifier register action. Later, packet_release operates on only one of the two applicable linked lists. The attacker can achieve Program Counter control.

CVSS3: 8.1
1%
Низкий
около 3 лет назад
fstec логотип
BDU:2019-00974

Уязвимость обработчика RAW-сокетов AF_PACKET ядра Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

CVSS3: 8.1
1%
Низкий
больше 7 лет назад
github логотип
GHSA-7cx6-7887-9rwv

The userfaultfd implementation in the Linux kernel before 4.19.7 mishandles access control for certain UFFDIO_ ioctl calls, as demonstrated by allowing local users to write data into holes in a tmpfs file (if the user has read-only access to that file, and that file contains holes), related to fs/userfaultfd.c and mm/userfaultfd.c.

CVSS3: 5.5
0%
Низкий
около 3 лет назад
fstec логотип
BDU:2020-00620

Уязвимость компонента userfaultfd ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на целостность защищаемой информации

CVSS3: 5.5
0%
Низкий
больше 6 лет назад
oracle-oval логотип
ELSA-2019-4528

ELSA-2019-4528: Unbreakable Enterprise kernel security update (IMPORTANT)

больше 6 лет назад
oracle-oval логотип
ELSA-2019-4541

ELSA-2019-4541: Unbreakable Enterprise kernel security update (IMPORTANT)

больше 6 лет назад
oracle-oval логотип
ELSA-2019-4575

ELSA-2019-4575: Unbreakable Enterprise kernel security update (IMPORTANT)

больше 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:0196-1

Security update for the Linux Kernel

больше 6 лет назад
suse-cvrf логотип
openSUSE-SU-2019:0065-1

Security update for the Linux Kernel

около 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:0150-1

Security update for the Linux Kernel

больше 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:0224-1

Security update for the Linux Kernel

больше 6 лет назад

Уязвимостей на страницу