Incorrect Type Conversion or Cast Affecting kernel-uek-debug package, versions <0:2.6.39-400.307.1.el5uek
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-ORACLE5-KERNELUEKDEBUG-2545563
- published 10 Apr 2022
- disclosed 6 Dec 2018
Introduced: 6 Dec 2018
CVE-2018-9568 Open this link in a new tabHow to fix?
Upgrade Oracle:5
kernel-uek-debug
to version 0:2.6.39-400.307.1.el5uek or higher.
This issue was patched in ELSA-2019-4577
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream kernel-uek-debug
package and not the kernel-uek-debug
package as distributed by Oracle
.
See How to fix?
for Oracle:5
relevant fixed versions and status.
In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-113509306. References: Upstream kernel.
References
- https://linux.oracle.com/cve/CVE-2018-9568.html
- https://linux.oracle.com/errata/ELSA-2019-0512.html
- https://linux.oracle.com/errata/ELSA-2019-4575.html
- https://linux.oracle.com/errata/ELSA-2019-4576.html
- https://linux.oracle.com/errata/ELSA-2019-4577.html
- https://source.android.com/security/bulletin/2018-12-01
- https://usn.ubuntu.com/3880-2/
- https://usn.ubuntu.com/3880-1/
- https://access.redhat.com/errata/RHSA-2019:0514
- https://access.redhat.com/errata/RHSA-2019:0512
- https://access.redhat.com/errata/RHSA-2019:2696
- https://access.redhat.com/errata/RHSA-2019:2730
- https://access.redhat.com/errata/RHSA-2019:2736
- https://access.redhat.com/errata/RHSA-2019:3967
- https://access.redhat.com/errata/RHSA-2019:4056
- https://access.redhat.com/errata/RHSA-2019:4159
- https://access.redhat.com/errata/RHSA-2019:4164
- https://access.redhat.com/errata/RHSA-2019:4255