#VU15526 Privilege escalation in Linux kernel - CVE-2018-18559
Published: October 23, 2018 / Updated: October 25, 2018
Linux kernel
Linux Foundation
Description
The vulnerability allows a local attacker to gain elevated privileges on the target system.
The vulnerability exists due to improper handling of a certain multithreaded case involving packet_do_bind unregister and packet_notifier register actions after a race condition between fanout_add, from setsockopt, and a bind on an AF_PACKET socket. A local attacker can execute a program or file that submits malicious input, trigger a use-after-free condition and execute arbitrary code with kernel privileges.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.