Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2018-18559


In the Linux kernel through 4.19, a use-after-free can occur due to a race condition between fanout_add from setsockopt and bind on an AF_PACKET socket. This issue exists because of the 15fe076edea787807a7cdc168df832544b58eba6 incomplete fix for a race condition. The code mishandles a certain multithreaded case involving a packet_do_bind unregister action followed by a packet_notifier register action. Later, packet_release operates on only one of the two applicable linked lists. The attacker can achieve Program Counter control.


Published

2018-10-22T16:29:00.360

Last Modified

2024-11-21T03:56:09.357

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 8.1 (HIGH)

CVSSv2 Vector

AV:N/AC:M/Au:N/C:P/I:P/A:P

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

8.6

Impact Score

6.4

Weaknesses
  • Type: Primary
    CWE-362
    CWE-416

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System linux linux_kernel < 3.2.100 Yes
Operating System linux linux_kernel < 3.15 Yes
Operating System linux linux_kernel < 3.18.88 Yes
Operating System linux linux_kernel < 4.1.49 Yes
Operating System linux linux_kernel < 4.3 Yes
Operating System linux linux_kernel < 4.4.106 Yes
Operating System linux linux_kernel < 4.9.70 Yes
Operating System linux linux_kernel < 4.14.7 Yes
Application redhat openshift_container_platform 3.11 Yes
Application redhat virtualization_host 4.0 Yes
Operating System redhat enterprise_linux_desktop 7.0 Yes
Operating System redhat enterprise_linux_server 7.0 Yes
Operating System redhat enterprise_linux_server_aus 7.6 Yes
Operating System redhat enterprise_linux_server_eus 7.6 Yes
Operating System redhat enterprise_linux_server_tus 7.6 Yes
Operating System redhat enterprise_linux_workstation 7.0 Yes

References