CVE-2018-10675Use After Free in Kernel

CWE-416Use After Free9 documents8 sources
Severity
7.8HIGHNVD
EPSS
0.0%
top 88.92%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 2
Latest updateMay 13

Description

The do_get_mempolicy function in mm/mempolicy.c in the Linux kernel before 4.12.9 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted system calls.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages6 packages

Also affects: Ubuntu Linux 14.04, Enterprise Linux 6.4, 6.5, 6.6, 7.2, 7.3, 7.4, 7.6, 6.7, 7.5

Patches

🔴Vulnerability Details

3
GHSA
GHSA-496w-f8vc-3275: The do_get_mempolicy function in mm/mempolicy2022-05-13
OSV
CVE-2018-10675: The do_get_mempolicy function in mm/mempolicy2018-05-02
CVEList
CVE-2018-10675: The do_get_mempolicy function in mm/mempolicy2018-05-02

📋Vendor Advisories

3
Ubuntu
Linux kernel vulnerabilities2018-08-24
Debian
CVE-2018-10675: linux - The do_get_mempolicy function in mm/mempolicy.c in the Linux kernel before 4.12....2018
Red Hat
kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact2017-08-19

💬Community

2
Bugzilla
CVE-2018-14627 JBoss/WildFly: iiop does not honour strict transport confidentiality2018-09-03
Bugzilla
CVE-2018-10675 kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact2018-05-04
CVE-2018-10675 — Use After Free in Linux Kernel | cvebase