CVE-2018-18559

Priority
Description
In the Linux kernel through 4.19, a use-after-free can occur due to a race
condition between fanout_add from setsockopt and bind on an AF_PACKET
socket. This issue exists because of the
15fe076edea787807a7cdc168df832544b58eba6 incomplete fix for a race
condition. The code mishandles a certain multithreaded case involving a
packet_do_bind unregister action followed by a packet_notifier register
action. Later, packet_release operates on only one of the two applicable
linked lists. The attacker can achieve Program Counter control.
Notes
tyhicksThe xenial 4.4 kernel inherited the fix via a rebase on linux-stable
Package
Source: linux (LP Ubuntu Debian)
Upstream:released (4.15~rc2)
Ubuntu 18.04 LTS:not-affected (4.15.0-10.11)
Ubuntu 16.04 ESM:released (4.4.0-119.143)
Ubuntu 14.04 ESM:not-affected
Patches:
Introduced by
30f7ea1c2b5f5fb7462c5ae44fe2e40cb2d6a474
Fixed by
15fe076edea787807a7cdc168df832544b58eba6
Package
Upstream:released (4.15~rc2)
Ubuntu 18.04 LTS:not-affected (4.15.0-1001.1)
Ubuntu 16.04 ESM:released (4.4.0-1054.63)
Ubuntu 14.04 ESM:released (4.4.0-1016.16)
Patches:
Package
Upstream:released (4.15~rc2)
Ubuntu 18.04 LTS:not-affected (4.15.0-1002.2)
Ubuntu 16.04 ESM:released (4.15.0-1013.13~16.04.2)
Ubuntu 14.04 ESM:not-affected (4.15.0-1023.24~14.04.1)
Patches:
Package
Upstream:released (4.15~rc2)
Ubuntu 18.04 LTS:not-affected (4.18.0-1004.4~18.04.1)
Ubuntu 14.04 ESM:DNE
Patches:
Package
Upstream:released (4.15~rc2)
Ubuntu 18.04 LTS:DNE
Ubuntu 14.04 ESM:DNE
Patches:
Package
Upstream:released (4.15~rc2)
Ubuntu 18.04 LTS:DNE
Ubuntu 14.04 ESM:DNE (trusty was ignored [abandoned])
Patches:
Package
Upstream:released (4.15~rc2)
Ubuntu 18.04 LTS:not-affected (4.15.0-1001.1)
Ubuntu 16.04 ESM:released (4.15.0-1014.14~16.04.1)
Ubuntu 14.04 ESM:DNE
Patches:
Package
Upstream:released (4.15~rc2)
Ubuntu 18.04 LTS:DNE
Ubuntu 14.04 ESM:DNE
Patches:
Package
Upstream:released (4.15~rc2)
Ubuntu 18.04 LTS:DNE
Ubuntu 14.04 ESM:DNE (trusty was ignored [abandoned])
Patches:
Package
Upstream:released (4.15~rc2)
Ubuntu 18.04 LTS:DNE
Ubuntu 14.04 ESM:DNE (trusty was ignored [abandoned])
Patches:
Package
Upstream:released (4.15~rc2)
Ubuntu 18.04 LTS:not-affected
Ubuntu 16.04 ESM:released (4.15.0-24.26~16.04.1)
Ubuntu 14.04 ESM:DNE
Patches:
Package
Upstream:released (4.15~rc2)
Ubuntu 18.04 LTS:not-affected (4.18.0-11.12~18.04.1)
Ubuntu 16.04 ESM:released (4.15.0-24.26~16.04.1)
Ubuntu 14.04 ESM:DNE
Patches:
Package
Upstream:released (4.15~rc2)
Ubuntu 18.04 LTS:not-affected (4.15.0-1002.2)
Ubuntu 16.04 ESM:released (4.4.0-1020.25)
Ubuntu 14.04 ESM:DNE
Patches:
Package
Upstream:released (4.15~rc2)
Ubuntu 18.04 LTS:DNE
Ubuntu 14.04 ESM:DNE
Patches:
Package
Upstream:released (4.15~rc2)
Ubuntu 18.04 LTS:DNE
Ubuntu 14.04 ESM:DNE (trusty was ignored [out of standard support])
Patches:
Package
Upstream:released (4.15~rc2)
Ubuntu 18.04 LTS:DNE
Ubuntu 14.04 ESM:DNE (trusty was ignored [out of standard support])
Patches:
Package
Upstream:released (4.15~rc2)
Ubuntu 18.04 LTS:DNE
Ubuntu 14.04 ESM:DNE (trusty was ignored [out of standard support])
Patches:
Package
Upstream:released (4.15~rc2)
Ubuntu 18.04 LTS:DNE
Ubuntu 14.04 ESM:released (4.4.0-119.143~14.04.1)
Patches:
Package
Upstream:released (4.15~rc2)
Ubuntu 18.04 LTS:DNE
Ubuntu 14.04 ESM:DNE (trusty was ignored [abandoned])
Patches:
Package
Upstream:released (4.15~rc2)
Ubuntu 18.04 LTS:DNE
Ubuntu 14.04 ESM:DNE (trusty was ignored [abandoned])
Patches:
Package
Upstream:released (4.15~rc2)
Ubuntu 18.04 LTS:DNE
Ubuntu 14.04 ESM:DNE (trusty was ignored [abandoned])
Patches:
Package
Upstream:released (4.15~rc2)
Ubuntu 18.04 LTS:not-affected (4.15.0-1002.3)
Ubuntu 14.04 ESM:DNE
Patches:
Package
Upstream:released (4.15~rc2)
Ubuntu 18.04 LTS:not-affected (4.15.0-1006.7)
Ubuntu 14.04 ESM:DNE
Patches:
Package
Upstream:released (4.15~rc2)
Ubuntu 18.04 LTS:not-affected
Ubuntu 14.04 ESM:DNE
Patches:
More Information

Updated: 2022-04-13 13:26:11 UTC (commit f411bd370d482ef4385c4e751d121a4055fbc009)