Lucene search

K
redhatcveRedhat.comRH:CVE-2018-9568
HistoryApr 06, 2020 - 11:05 p.m.

CVE-2018-9568

2020-04-0623:05:01
redhat.com
access.redhat.com
32

0.0004 Low

EPSS

Percentile

10.2%

A possible memory corruption due to a type confusion was found in the Linux kernel in the sk_clone_lock() function in the net/core/sock.c. The possibility of local escalation of privileges cannot be fully ruled out for a local unprivileged attacker.

Mitigation

The currently known attack vector uses IPv6 for exploitation. If IPv6 is not needed on the host, disabling it mitigates this attack vector. Please see <https://access.redhat.com/solutions/8709&gt; for instructions on how to disable IPv6 in Red Hat Enterprise Linux.