pkg/sentry/kernel/shm/shm.go in Google gVisor before 2018-11-01 allows attackers to overwrite memory locations in processes running as root (but not escape the sandbox) via vectors involving IPC_RMID shmctl calls, because reference counting is mishandled.
Advisories
Source ID Title
EUVD EUVD EUVD-2018-11031 pkg/sentry/kernel/shm/shm.go in Google gVisor before 2018-11-01 allows attackers to overwrite memory locations in processes running as root (but not escape the sandbox) via vectors involving IPC_RMID shmctl calls, because reference counting is mishandled.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T11:37:10.624Z

Reserved: 2018-11-17T00:00:00

Link: CVE-2018-19333

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-11-17T17:29:00.227

Modified: 2024-11-21T03:57:44.773

Link: CVE-2018-19333

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses