CVE-2018-9568Incorrect Type Conversion or Cast in Kernel

Severity
7.8HIGHNVD
EPSS
0.5%
top 35.83%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 6
Latest updateMay 13

Description

In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-113509306. References: Upstream kernel.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages6 packages

CVEListV5google_inc/androidAndroid kernel
NVDlinux/linux_kernel3.113.16.58+6
Debianlinux/linux_kernel< 4.13.10-1+3

Also affects: Ubuntu Linux 12.04, 14.04, Enterprise Linux 7.6

Patches

🔴Vulnerability Details

5
GHSA
GHSA-8hfc-fgjc-59xp: In sk_clone_lock of sock2022-05-13
Project0
In-the-Wild Series: Android Exploits - Project Zero2021-01-01
Kernel
mm/slab: validate cache membership under freelist hardening2019-07-11
CVEList
CVE-2018-9568: In sk_clone_lock of sock2018-12-06
OSV
CVE-2018-9568: In sk_clone_lock of sock2018-12-06

📋Vendor Advisories

5
Ubuntu
Linux kernel (Trusty HWE) vulnerabilities2019-02-04
Ubuntu
Linux kernel vulnerabilities2019-02-04
Android
CVE-2018-9568: network2018-12-01
Debian
CVE-2018-9568: linux - In sk_clone_lock of sock.c, there is a possible memory corruption due to type co...2018
Red Hat
kernel: Memory corruption due to incorrect socket cloning2017-09-28

💬Community

1
Bugzilla
CVE-2018-9568 kernel: Memory corruption due to incorrect socket cloning2018-12-04
CVE-2018-9568 — Incorrect Type Conversion or Cast | cvebase