CVE-2018-18559

Impact:
Important
Public Date:
2018-06-15
CWE:
CWE-416
Bugzilla:
1641878: CVE-2018-18559 kernel: Use-after-free due to race condition in AF_PACKET implementation
A use-after-free flaw can occur in the Linux kernel due to a race condition between packet_do_bind() and packet_notifier() functions called for an AF_PACKET socket. An unprivileged, local user could use this flaw to induce kernel memory corruption on the system, leading to an unresponsive system or to a crash. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.

Find out more about CVE-2018-18559 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v3 metrics

CVSS3 Base Score 7
CVSS3 Base Metrics CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector Local
Attack Complexity High
Privileges Required Low
User Interaction None
Scope Unchanged
Confidentiality High
Integrity Impact High
Availability Impact High

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux for Real Time for NFV (v. 7) (kernel-rt) RHSA-2019:0188 2019-01-29
Red Hat Enterprise Linux 7 (kernel) RHSA-2019:0163 2019-01-29
Red Hat MRG Grid for RHEL 6 Server v.2 (kernel-rt) RHSA-2019:1190 2019-05-14
Red Hat Enterprise Linux Extended Update Support 7.4 (kernel) RHSA-2019:1170 2019-05-14

Affected Packages State

Platform Package State
Red Hat Enterprise Linux 8 kernel-rt Not affected
Red Hat Enterprise Linux 8 kernel Not affected
Red Hat Enterprise Linux 7 kernel-alt Affected
Red Hat Enterprise Linux 6 kernel Not affected
Red Hat Enterprise Linux 5 kernel Not affected

External References

Last Modified