CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
82.4%
In the Linux kernel through 4.19, a use-after-free can occur due to a race
condition between fanout_add from setsockopt and bind on an AF_PACKET
socket. This issue exists because of the
15fe076edea787807a7cdc168df832544b58eba6 incomplete fix for a race
condition. The code mishandles a certain multithreaded case involving a
packet_do_bind unregister action followed by a packet_notifier register
action. Later, packet_release operates on only one of the two applicable
linked lists. The attacker can achieve Program Counter control.
Author | Note |
---|---|
tyhicks | The xenial 4.4 kernel inherited the fix via a rebase on linux-stable |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 16.04 | noarch | linux | < 4.4.0-119.143 | UNKNOWN |
ubuntu | 14.04 | noarch | linux-aws | < 4.4.0-1016.16 | UNKNOWN |
ubuntu | 16.04 | noarch | linux-aws | < 4.4.0-1054.63 | UNKNOWN |
ubuntu | 16.04 | noarch | linux-azure | < 4.15.0-1013.13~16.04.2 | UNKNOWN |
ubuntu | 16.04 | noarch | linux-gcp | < 4.15.0-1014.14~16.04.1 | UNKNOWN |
ubuntu | 16.04 | noarch | linux-hwe | < 4.15.0-24.26~16.04.1 | UNKNOWN |
ubuntu | 16.04 | noarch | linux-hwe-edge | < 4.15.0-24.26~16.04.1 | UNKNOWN |
ubuntu | 16.04 | noarch | linux-kvm | < 4.4.0-1020.25 | UNKNOWN |
ubuntu | 14.04 | noarch | linux-lts-xenial | < 4.4.0-119.143~14.04.1 | UNKNOWN |
ubuntu | 16.04 | noarch | linux-raspi2 | < 4.4.0-1086.94 | UNKNOWN |
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
82.4%