Lucene search

K
ubuntucveUbuntu.comUB:CVE-2018-18559
HistoryOct 22, 2018 - 12:00 a.m.

CVE-2018-18559

2018-10-2200:00:00
ubuntu.com
ubuntu.com
12

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

0.012 Low

EPSS

Percentile

85.2%

In the Linux kernel through 4.19, a use-after-free can occur due to a race
condition between fanout_add from setsockopt and bind on an AF_PACKET
socket. This issue exists because of the
15fe076edea787807a7cdc168df832544b58eba6 incomplete fix for a race
condition. The code mishandles a certain multithreaded case involving a
packet_do_bind unregister action followed by a packet_notifier register
action. Later, packet_release operates on only one of the two applicable
linked lists. The attacker can achieve Program Counter control.

Notes

Author Note
tyhicks The xenial 4.4 kernel inherited the fix via a rebase on linux-stable
OSVersionArchitecturePackageVersionFilename
ubuntu16.04noarchlinux< 4.4.0-119.143UNKNOWN
ubuntu14.04noarchlinux-aws< 4.4.0-1016.16UNKNOWN
ubuntu16.04noarchlinux-aws< 4.4.0-1054.63UNKNOWN
ubuntu16.04noarchlinux-azure< 4.15.0-1013.13~16.04.2UNKNOWN
ubuntu16.04noarchlinux-gcp< 4.15.0-1014.14~16.04.1UNKNOWN
ubuntu16.04noarchlinux-hwe< 4.15.0-24.26~16.04.1UNKNOWN
ubuntu16.04noarchlinux-hwe-edge< 4.15.0-24.26~16.04.1UNKNOWN
ubuntu16.04noarchlinux-kvm< 4.4.0-1020.25UNKNOWN
ubuntu14.04noarchlinux-lts-xenial< 4.4.0-119.143~14.04.1UNKNOWN
ubuntu16.04noarchlinux-raspi2< 4.4.0-1086.94UNKNOWN
Rows per page:
1-10 of 111

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

0.012 Low

EPSS

Percentile

85.2%