Логотип exploitDog
bind:CVE-2018-18559
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2018-18559

Количество 8

Количество 8

ubuntu логотип

CVE-2018-18559

больше 6 лет назад

In the Linux kernel through 4.19, a use-after-free can occur due to a race condition between fanout_add from setsockopt and bind on an AF_PACKET socket. This issue exists because of the 15fe076edea787807a7cdc168df832544b58eba6 incomplete fix for a race condition. The code mishandles a certain multithreaded case involving a packet_do_bind unregister action followed by a packet_notifier register action. Later, packet_release operates on only one of the two applicable linked lists. The attacker can achieve Program Counter control.

CVSS3: 8.1
EPSS: Низкий
redhat логотип

CVE-2018-18559

около 7 лет назад

In the Linux kernel through 4.19, a use-after-free can occur due to a race condition between fanout_add from setsockopt and bind on an AF_PACKET socket. This issue exists because of the 15fe076edea787807a7cdc168df832544b58eba6 incomplete fix for a race condition. The code mishandles a certain multithreaded case involving a packet_do_bind unregister action followed by a packet_notifier register action. Later, packet_release operates on only one of the two applicable linked lists. The attacker can achieve Program Counter control.

CVSS3: 7
EPSS: Низкий
nvd логотип

CVE-2018-18559

больше 6 лет назад

In the Linux kernel through 4.19, a use-after-free can occur due to a race condition between fanout_add from setsockopt and bind on an AF_PACKET socket. This issue exists because of the 15fe076edea787807a7cdc168df832544b58eba6 incomplete fix for a race condition. The code mishandles a certain multithreaded case involving a packet_do_bind unregister action followed by a packet_notifier register action. Later, packet_release operates on only one of the two applicable linked lists. The attacker can achieve Program Counter control.

CVSS3: 8.1
EPSS: Низкий
debian логотип

CVE-2018-18559

больше 6 лет назад

In the Linux kernel through 4.19, a use-after-free can occur due to a ...

CVSS3: 8.1
EPSS: Низкий
github логотип

GHSA-8w88-57v8-p48h

около 3 лет назад

In the Linux kernel through 4.19, a use-after-free can occur due to a race condition between fanout_add from setsockopt and bind on an AF_PACKET socket. This issue exists because of the 15fe076edea787807a7cdc168df832544b58eba6 incomplete fix for a race condition. The code mishandles a certain multithreaded case involving a packet_do_bind unregister action followed by a packet_notifier register action. Later, packet_release operates on only one of the two applicable linked lists. The attacker can achieve Program Counter control.

CVSS3: 8.1
EPSS: Низкий
fstec логотип

BDU:2019-00974

больше 7 лет назад

Уязвимость обработчика RAW-сокетов AF_PACKET ядра Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

CVSS3: 8.1
EPSS: Низкий
oracle-oval логотип

ELSA-2019-0163

больше 6 лет назад

ELSA-2019-0163: kernel security, bug fix, and enhancement update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2019-4575

больше 6 лет назад

ELSA-2019-4575: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2018-18559

In the Linux kernel through 4.19, a use-after-free can occur due to a race condition between fanout_add from setsockopt and bind on an AF_PACKET socket. This issue exists because of the 15fe076edea787807a7cdc168df832544b58eba6 incomplete fix for a race condition. The code mishandles a certain multithreaded case involving a packet_do_bind unregister action followed by a packet_notifier register action. Later, packet_release operates on only one of the two applicable linked lists. The attacker can achieve Program Counter control.

CVSS3: 8.1
1%
Низкий
больше 6 лет назад
redhat логотип
CVE-2018-18559

In the Linux kernel through 4.19, a use-after-free can occur due to a race condition between fanout_add from setsockopt and bind on an AF_PACKET socket. This issue exists because of the 15fe076edea787807a7cdc168df832544b58eba6 incomplete fix for a race condition. The code mishandles a certain multithreaded case involving a packet_do_bind unregister action followed by a packet_notifier register action. Later, packet_release operates on only one of the two applicable linked lists. The attacker can achieve Program Counter control.

CVSS3: 7
1%
Низкий
около 7 лет назад
nvd логотип
CVE-2018-18559

In the Linux kernel through 4.19, a use-after-free can occur due to a race condition between fanout_add from setsockopt and bind on an AF_PACKET socket. This issue exists because of the 15fe076edea787807a7cdc168df832544b58eba6 incomplete fix for a race condition. The code mishandles a certain multithreaded case involving a packet_do_bind unregister action followed by a packet_notifier register action. Later, packet_release operates on only one of the two applicable linked lists. The attacker can achieve Program Counter control.

CVSS3: 8.1
1%
Низкий
больше 6 лет назад
debian логотип
CVE-2018-18559

In the Linux kernel through 4.19, a use-after-free can occur due to a ...

CVSS3: 8.1
1%
Низкий
больше 6 лет назад
github логотип
GHSA-8w88-57v8-p48h

In the Linux kernel through 4.19, a use-after-free can occur due to a race condition between fanout_add from setsockopt and bind on an AF_PACKET socket. This issue exists because of the 15fe076edea787807a7cdc168df832544b58eba6 incomplete fix for a race condition. The code mishandles a certain multithreaded case involving a packet_do_bind unregister action followed by a packet_notifier register action. Later, packet_release operates on only one of the two applicable linked lists. The attacker can achieve Program Counter control.

CVSS3: 8.1
1%
Низкий
около 3 лет назад
fstec логотип
BDU:2019-00974

Уязвимость обработчика RAW-сокетов AF_PACKET ядра Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

CVSS3: 8.1
1%
Низкий
больше 7 лет назад
oracle-oval логотип
ELSA-2019-0163

ELSA-2019-0163: kernel security, bug fix, and enhancement update (IMPORTANT)

больше 6 лет назад
oracle-oval логотип
ELSA-2019-4575

ELSA-2019-4575: Unbreakable Enterprise kernel security update (IMPORTANT)

больше 6 лет назад

Уязвимостей на страницу