First published: Wed Sep 19 2018(Updated: )
A security flaw was discovered in the Linux kernel. The vmacache_flush_all() function in mm/vmacache.c mishandles sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, map, unmap, invalidation, and dereference operations. References: <a href="https://seclists.org/oss-sec/2018/q3/251">https://seclists.org/oss-sec/2018/q3/251</a> An upstream patch: <a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7a9cdebdcc17e426fb5287e4a82db1dfe86339b2">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7a9cdebdcc17e426fb5287e4a82db1dfe86339b2</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | >=3.16<3.16.58 | |
Linux Linux kernel | >=3.17<3.18.123 | |
Linux Linux kernel | >=3.19<4.4.157 | |
Linux Linux kernel | >=4.5<4.9.128 | |
Linux Linux kernel | >=4.10<4.14.71 | |
Linux Linux kernel | >=4.15<4.18.9 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Netapp Active Iq Performance Analytics Services | ||
Netapp Element Software | ||
Google Android | ||
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.11.10-1 6.12.5-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-17182 is a vulnerability discovered in the Linux kernel through version 4.18.8 that allows an attacker to trigger a use-after-free and possibly gain privileges.
CVE-2018-17182 has a severity level of 7, which is considered high.
CVE-2018-17182 affects Linux kernel versions up to and including version 4.18.8.
To fix CVE-2018-17182, update your Linux kernel to version 4.19 or later.
You can find more information about CVE-2018-17182 at the following links: [Link 1](http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7a9cdebdcc17e426fb5287e4a82db1dfe86339b2), [Link 2](https://github.com/torvalds/linux/commit/7a9cdebdcc17e426fb5287e4a82db1dfe86339b2), [Link 3](https://www.openwall.com/lists/oss-security/2018/09/18/4).