← Zuruck zu CVEs
CVE-2018-17182
HIGH7.8
Beschreibung
An issue was discovered in the Linux kernel through 4.18.8. The vmacache_flush_all function in mm/vmacache.c mishandles sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, map, unmap, invalidation, and dereference operations.
CVE Details
CVSS v3.1 Bewertung7.8
SchweregradHIGH
CVSS VektorCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AngriffsvektorLOCAL
KomplexitatLOW
Erforderliche PrivilegienLOW
BenutzerinteraktionNONE
Veroffentlicht9/19/2018
Zuletzt geandert11/21/2024
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
canonical:ubuntu_linuxdebian:debian_linuxlinux:linux_kernelnetapp:active_iq_performance_analytics_servicesnetapp:element_software
Schwachen (CWE)
CWE-416
Referenzen
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7a9cdebdcc17e426fb5287e4a82db1dfe86339b2(cve@mitre.org)
http://www.securityfocus.com/bid/105417(cve@mitre.org)
http://www.securityfocus.com/bid/106503(cve@mitre.org)
http://www.securitytracker.com/id/1041748(cve@mitre.org)
https://access.redhat.com/errata/RHSA-2018:3656(cve@mitre.org)
https://security.netapp.com/advisory/ntap-20190204-0001/(cve@mitre.org)
https://usn.ubuntu.com/3776-1/(cve@mitre.org)
https://usn.ubuntu.com/3776-2/(cve@mitre.org)
https://usn.ubuntu.com/3777-1/(cve@mitre.org)
https://usn.ubuntu.com/3777-2/(cve@mitre.org)
https://usn.ubuntu.com/3777-3/(cve@mitre.org)
https://www.debian.org/security/2018/dsa-4308(cve@mitre.org)
https://www.exploit-db.com/exploits/45497/(cve@mitre.org)
https://www.openwall.com/lists/oss-security/2018/09/18/4(cve@mitre.org)
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7a9cdebdcc17e426fb5287e4a82db1dfe86339b2(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/105417(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/106503(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1041748(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:3656(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/torvalds/linux/commit/7a9cdebdcc17e426fb5287e4a82db1dfe86339b2(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2018/10/msg00003.html(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20190204-0001/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3776-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3776-2/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3777-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3777-2/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3777-3/(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2018/dsa-4308(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/45497/(af854a3a-2127-422b-91ae-364da2661108)
https://www.openwall.com/lists/oss-security/2018/09/18/4(af854a3a-2127-422b-91ae-364da2661108)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.