In the Linux kernel through 4.19, a use-after-free can occur due to a race condition between fanoutadd from setsockopt and bind on an AFPACKET socket. This issue exists because of the 15fe076edea787807a7cdc168df832544b58eba6 incomplete fix for a race condition. The code mishandles a certain multithreaded case involving a packetdobind unregister action followed by a packetnotifier register action. Later, packetrelease operates on only one of the two applicable linked lists. The attacker can achieve Program Counter control.
[
{
"events": [
{
"introduced": "3.2.95"
},
{
"fixed": "3.2.100"
}
]
},
{
"events": [
{
"introduced": "3.14.58"
},
{
"fixed": "3.15"
}
]
},
{
"events": [
{
"introduced": "3.18.25"
},
{
"fixed": "3.18.88"
}
]
},
{
"events": [
{
"introduced": "4.1.14"
},
{
"fixed": "4.1.49"
}
]
},
{
"events": [
{
"introduced": "4.2.7"
},
{
"fixed": "4.3"
}
]
},
{
"events": [
{
"introduced": "4.3.1"
},
{
"fixed": "4.4.106"
}
]
},
{
"events": [
{
"introduced": "4.5"
},
{
"fixed": "4.9.70"
}
]
},
{
"events": [
{
"introduced": "4.10"
},
{
"fixed": "4.14.7"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "3.11"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.6"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.6"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.6"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.0"
}
]
}
]
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-18559.json"