Linux kernel is vulnerable to use-after-free vulnerability. A local authenticated attacker is able gain privileges via crafted system calls that trigger mishandling of packet_fanout data structures leading to a use-after-free flaw. This issue affects an unknown part of the file net/packet/af_packet.c
.
git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=008ba2a13f2d04c947adc536d19debb8fe66f110
git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4971613c1639d8e5f102c4e797c3bf8f83a5a69e
patchwork.ozlabs.org/patch/813945/
patchwork.ozlabs.org/patch/818726/
www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.6
www.securityfocus.com/bid/101573
access.redhat.com/articles/3327131
access.redhat.com/errata/RHSA-2018:0151
access.redhat.com/errata/RHSA-2018:0152
access.redhat.com/errata/RHSA-2018:0181
access.redhat.com/security/cve/CVE-2015-8539
access.redhat.com/security/cve/CVE-2017-12192
access.redhat.com/security/cve/CVE-2017-12193
access.redhat.com/security/cve/CVE-2017-15649
access.redhat.com/security/cve/CVE-2017-5715
access.redhat.com/security/cve/CVE-2017-5753
access.redhat.com/security/cve/CVE-2017-5754
access.redhat.com/security/cve/CVE-2017-7472
access.redhat.com/security/updates/classification/#important
access.redhat.com/security/vulnerabilities/speculativeexecution
blogs.securiteam.com/index.php/archives/3484
bugzilla.redhat.com/show_bug.cgi?id=1519778
bugzilla.redhat.com/show_bug.cgi?id=1519780
bugzilla.redhat.com/show_bug.cgi?id=1519781
github.com/torvalds/linux/commit/008ba2a13f2d04c947adc536d19debb8fe66f110
github.com/torvalds/linux/commit/4971613c1639d8e5f102c4e797c3bf8f83a5a69e
lists.debian.org/debian-lts-announce/2017/12/msg00004.html
usn.ubuntu.com/3754-1/