The Linux Kernel version 3.18 contains a dangerous feature vulnerability in modify_user_hw_breakpoint() that can result in crash and possibly memory corruption. This attack appear to be exploitable via local code execution and the ability to use ptrace. This vulnerability appears to have been fixed in git commit f67b15037a7a50c57f72e69a6d59941ad90a0f0f.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
21 Nov 2024, 03:39
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html - | |
References | () http://www.securitytracker.com/id/1040806 - Third Party Advisory, VDB Entry | |
References | () https://access.redhat.com/errata/RHSA-2018:1318 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2018:1345 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2018:1347 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2018:1348 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2018:1354 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2018:1355 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2018:1374 - Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html - Third Party Advisory | |
References | () https://lkml.org/lkml/2018/4/6/813 - Mailing List, Patch, Third Party Advisory | |
References | () https://usn.ubuntu.com/3641-1/ - Third Party Advisory | |
References | () https://usn.ubuntu.com/3641-2/ - Third Party Advisory | |
References | () https://www.debian.org/security/2018/dsa-4187 - Third Party Advisory | |
References | () https://www.debian.org/security/2018/dsa-4188 - Third Party Advisory |
Information
Published : 2018-05-24 13:29
Updated : 2024-11-21 03:39
NVD link : CVE-2018-1000199
Mitre link : CVE-2018-1000199
CVE.ORG link : CVE-2018-1000199
JSON object : View
Products Affected
redhat
- enterprise_linux_workstation
- enterprise_linux_server_tus
- enterprise_linux_server
- enterprise_linux_server_eus
- enterprise_linux_desktop
- enterprise_linux
- enterprise_linux_server_aus
debian
- debian_linux
linux
- linux_kernel
canonical
- ubuntu_linux
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer