[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2018-17972Date: (C)2018-10-09   (M)2024-04-19


An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 5.5CVSS Score : 4.9
Exploit Score: 1.8Exploit Score: 3.9
Impact Score: 3.6Impact Score: 6.9
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: LOCALAccess Vector: LOCAL
Attack Complexity: LOWAccess Complexity: LOW
Privileges Required: LOWAuthentication: NONE
User Interaction: NONEConfidentiality: COMPLETE
Scope: UNCHANGEDIntegrity: NONE
Confidentiality: HIGHAvailability: NONE
Integrity: NONE 
Availability: NONE 
  
Reference:
BID-105525
RHSA-2019:0512
RHSA-2019:0514
RHSA-2019:0831
RHSA-2019:2473
USN-3821-1
USN-3821-2
USN-3832-1
USN-3835-1
USN-3871-1
USN-3871-3
USN-3871-4
USN-3871-5
USN-3880-1
USN-3880-2
https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html
https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html
https://marc.info/?l=linux-fsdevel&m=153806242024956&w=2
https://support.f5.com/csp/article/K27673650?utm_source=f5support&%3Butm_medium=RSS
openSUSE-SU-2019:1407

CPE    9
cpe:/o:linux:linux_kernel
cpe:/o:canonical:ubuntu_linux:16.04::~~lts~~~
cpe:/o:redhat:enterprise_linux_workstation:7.0
cpe:/o:redhat:enterprise_linux_desktop:7.0
...
CWE    1
CWE-362
OVAL    43
oval:org.secpod.oval:def:704481
oval:org.secpod.oval:def:51210
oval:org.secpod.oval:def:51216
oval:org.secpod.oval:def:704478
...

© SecPod Technologies