First published: Mon Oct 22 2018(Updated: )
In the Linux kernel through 4.19, a use-after-free can occur due to a race condition between fanout_add from setsockopt and bind on an AF_PACKET socket. This issue exists because of the 15fe076edea787807a7cdc168df832544b58eba6 incomplete fix for a race condition. The code mishandles a certain multithreaded case involving a packet_do_bind unregister action followed by a packet_notifier register action. Later, packet_release operates on only one of the two applicable linked lists. The attacker can achieve Program Counter control.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | >=3.2.95<3.2.100 | |
Linux Linux kernel | >=3.14.58<3.15 | |
Linux Linux kernel | >=3.18.25<3.18.88 | |
Linux Linux kernel | >=4.1.14<4.1.49 | |
Linux Linux kernel | >=4.2.7<4.3 | |
Linux Linux kernel | >=4.3.1<4.4.106 | |
Linux Linux kernel | >=4.5<4.9.70 | |
Linux Linux kernel | >=4.10<4.14.7 | |
Redhat Openshift Container Platform | =3.11 | |
Redhat Virtualization Host | =4.0 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Server Aus | =7.6 | |
Redhat Enterprise Linux Server Eus | =7.6 | |
Redhat Enterprise Linux Server Tus | =7.6 | |
Redhat Enterprise Linux Workstation | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-18559 is a vulnerability in the Linux kernel that can lead to a use-after-free due to a race condition.
The severity of CVE-2018-18559 is high with a CVSS score of 8.1.
CVE-2018-18559 affects various versions of the Linux kernel.
The fix for CVE-2018-18559 can be found in the Linux kernel's commit 15fe076edea787807a7cdc168df832544b58eba6.
Yes, you can find references for CVE-2018-18559 in the SecuriTeam blog, the Linux kernel's commit, and the Red Hat bugzilla.