CVE-2018-18397

The userfaultfd implementation in the Linux kernel before 4.19.7 mishandles access control for certain UFFDIO_ ioctl calls, as demonstrated by allowing local users to write data into holes in a tmpfs file (if the user has read-only access to that file, and that file contains holes), related to fs/userfaultfd.c and mm/userfaultfd.c.
References
Link Resource
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=29ec90660d68bbdd69507c1c8b4e33aa299278b1 Patch Third Party Advisory
https://access.redhat.com/errata/RHBA-2019:0327 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:0163 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:0202 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:0324 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:0831 Third Party Advisory
https://bugs.chromium.org/p/project-zero/issues/detail?id=1700 Exploit Issue Tracking Third Party Advisory
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.87 Patch Vendor Advisory
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.7 Patch Vendor Advisory
https://github.com/torvalds/linux/commit/29ec90660d68bbdd69507c1c8b4e33aa299278b1 Patch Third Party Advisory
https://usn.ubuntu.com/3901-1/ Third Party Advisory
https://usn.ubuntu.com/3901-2/ Third Party Advisory
https://usn.ubuntu.com/3903-1/ Third Party Advisory
https://usn.ubuntu.com/3903-2/ Third Party Advisory
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=29ec90660d68bbdd69507c1c8b4e33aa299278b1 Patch Third Party Advisory
https://access.redhat.com/errata/RHBA-2019:0327 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:0163 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:0202 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:0324 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:0831 Third Party Advisory
https://bugs.chromium.org/p/project-zero/issues/detail?id=1700 Exploit Issue Tracking Third Party Advisory
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.87 Patch Vendor Advisory
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.7 Patch Vendor Advisory
https://github.com/torvalds/linux/commit/29ec90660d68bbdd69507c1c8b4e33aa299278b1 Patch Third Party Advisory
https://usn.ubuntu.com/3901-1/ Third Party Advisory
https://usn.ubuntu.com/3901-2/ Third Party Advisory
https://usn.ubuntu.com/3903-1/ Third Party Advisory
https://usn.ubuntu.com/3903-2/ Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*
cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*

History

21 Nov 2024, 03:55

Type Values Removed Values Added
References () http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=29ec90660d68bbdd69507c1c8b4e33aa299278b1 - Patch, Third Party Advisory () http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=29ec90660d68bbdd69507c1c8b4e33aa299278b1 - Patch, Third Party Advisory
References () https://access.redhat.com/errata/RHBA-2019:0327 - Third Party Advisory () https://access.redhat.com/errata/RHBA-2019:0327 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2019:0163 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2019:0163 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2019:0202 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2019:0202 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2019:0324 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2019:0324 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2019:0831 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2019:0831 - Third Party Advisory
References () https://bugs.chromium.org/p/project-zero/issues/detail?id=1700 - Exploit, Issue Tracking, Third Party Advisory () https://bugs.chromium.org/p/project-zero/issues/detail?id=1700 - Exploit, Issue Tracking, Third Party Advisory
References () https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.87 - Patch, Vendor Advisory () https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.87 - Patch, Vendor Advisory
References () https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.7 - Patch, Vendor Advisory () https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.7 - Patch, Vendor Advisory
References () https://github.com/torvalds/linux/commit/29ec90660d68bbdd69507c1c8b4e33aa299278b1 - Patch, Third Party Advisory () https://github.com/torvalds/linux/commit/29ec90660d68bbdd69507c1c8b4e33aa299278b1 - Patch, Third Party Advisory
References () https://usn.ubuntu.com/3901-1/ - Third Party Advisory () https://usn.ubuntu.com/3901-1/ - Third Party Advisory
References () https://usn.ubuntu.com/3901-2/ - Third Party Advisory () https://usn.ubuntu.com/3901-2/ - Third Party Advisory
References () https://usn.ubuntu.com/3903-1/ - Third Party Advisory () https://usn.ubuntu.com/3903-1/ - Third Party Advisory
References () https://usn.ubuntu.com/3903-2/ - Third Party Advisory () https://usn.ubuntu.com/3903-2/ - Third Party Advisory

Information

Published : 2018-12-12 10:29

Updated : 2024-11-21 03:55


NVD link : CVE-2018-18397

Mitre link : CVE-2018-18397

CVE.ORG link : CVE-2018-18397


JSON object : View

Products Affected

redhat

  • enterprise_linux_server
  • enterprise_linux_server_eus
  • enterprise_linux_desktop
  • enterprise_linux_server_aus
  • enterprise_linux_workstation
  • openshift_container_platform
  • enterprise_linux_server_tus
  • virtualization_host

canonical

  • ubuntu_linux

linux

  • linux_kernel
CWE
CWE-863

Incorrect Authorization