An issue was discovered in the Linux kernel through 4.18.8. The vmacacheflushall function in mm/vmacache.c mishandles sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, map, unmap, invalidation, and dereference operations.
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-17182.json"
[
{
"events": [
{
"introduced": "3.16"
},
{
"fixed": "3.16.58"
}
]
},
{
"events": [
{
"introduced": "3.17"
},
{
"fixed": "3.18.123"
}
]
},
{
"events": [
{
"introduced": "3.19"
},
{
"fixed": "4.4.157"
}
]
},
{
"events": [
{
"introduced": "4.5"
},
{
"fixed": "4.9.128"
}
]
},
{
"events": [
{
"introduced": "4.10"
},
{
"fixed": "4.14.71"
}
]
},
{
"events": [
{
"introduced": "4.15"
},
{
"fixed": "4.18.9"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "14.04"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "16.04"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "18.04"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "9.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.18.8."
}
]
}
]