Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-1000199

Опубликовано: 01 мая 2018
Источник: redhat
CVSS3: 7.8

Описание

The Linux Kernel version 3.18 contains a dangerous feature vulnerability in modify_user_hw_breakpoint() that can result in crash and possibly memory corruption. This attack appear to be exploitable via local code execution and the ability to use ptrace. This vulnerability appears to have been fixed in git commit f67b15037a7a50c57f72e69a6d59941ad90a0f0f.

An address corruption flaw was discovered in the Linux kernel built with hardware breakpoint (CONFIG_HAVE_HW_BREAKPOINT) support. While modifying a h/w breakpoint via 'modify_user_hw_breakpoint' routine, an unprivileged user/process could use this flaw to crash the system kernel resulting in DoS OR to potentially escalate privileges on a the system.

Отчет

This issue does not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 5 and Red Hat Enterprise Linux 6. This issue affects the version of the kernel package as shipped with Red Hat Enterprise Linux 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 7 and Red Hat Enterprise MRG 2 may address this issue.

Меры по смягчению последствий

To mitigate this issue:

  1. Save the following script in a 'CVE-2018-1000199.stp' file.

probe kernel.function("ptrace_set_debugreg") { if ($n < 4) $n = 4; /* set invalid debug register #, returns -EIO */ } probe begin { printk(0, "CVE-2018-1000199 mitigation loaded") } probe end { printk(0, "CVE-2018-1000199 mitigation unloaded") }

  1. Install systemtap package and its dependencies

yum install -y systemtap systemtap-runtime

yum install -y kernel-devel kernel-debuginfo kernel-debuginfo-common

  1. Build the mitigation kernel module as root.

stap -r uname -r -m cve_2018_1000199.ko -g CVE-2018-1000199.stp -p4

  1. Load the mitigation module as root

staprun -L cve_2018_1000199.ko

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5kernelNot affected
Red Hat Enterprise Linux 6kernelNot affected
Red Hat Enterprise Linux 8kernelNot affected
Red Hat Enterprise Linux 7kernel-rtFixedRHSA-2018:135508.05.2018
Red Hat Enterprise Linux 7kernelFixedRHSA-2018:131808.05.2018
Red Hat Enterprise Linux 7kernel-altFixedRHSA-2018:137414.05.2018
Red Hat Enterprise Linux 7.2 Advanced Update SupportkernelFixedRHSA-2018:134708.05.2018
Red Hat Enterprise Linux 7.2 Telco Extended Update SupportkernelFixedRHSA-2018:134708.05.2018
Red Hat Enterprise Linux 7.2 Update Services for SAP SolutionskernelFixedRHSA-2018:134708.05.2018
Red Hat Enterprise Linux 7.3 Extended Update SupportkernelFixedRHSA-2018:134808.05.2018

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-460
https://bugzilla.redhat.com/show_bug.cgi?id=1568477kernel: ptrace() incorrect error handling leads to corruption and DoS

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 5.5
ubuntu
около 7 лет назад

The Linux Kernel version 3.18 contains a dangerous feature vulnerability in modify_user_hw_breakpoint() that can result in crash and possibly memory corruption. This attack appear to be exploitable via local code execution and the ability to use ptrace. This vulnerability appears to have been fixed in git commit f67b15037a7a50c57f72e69a6d59941ad90a0f0f.

CVSS3: 5.5
nvd
около 7 лет назад

The Linux Kernel version 3.18 contains a dangerous feature vulnerability in modify_user_hw_breakpoint() that can result in crash and possibly memory corruption. This attack appear to be exploitable via local code execution and the ability to use ptrace. This vulnerability appears to have been fixed in git commit f67b15037a7a50c57f72e69a6d59941ad90a0f0f.

CVSS3: 5.5
debian
около 7 лет назад

The Linux Kernel version 3.18 contains a dangerous feature vulnerabili ...

suse-cvrf
около 7 лет назад

Security update for the Linux Kernel (Live Patch 27 for SLE 12 SP1)

suse-cvrf
около 7 лет назад

Security update for the Linux Kernel (Live Patch 22 for SLE 12 SP2)

7.8 High

CVSS3