CVE-2017-16994

Current Description

The walk_hugetlb_range function in mm/pagewalk.c in the Linux kernel before 4.14.2 mishandles holes in hugetlb ranges, which allows local users to obtain sensitive information from uninitialized kernel memory via crafted use of the mincore() system call.

Basic Data

PublishedNovember 27, 2017
Last ModifiedApril 25, 2018
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-200
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:L/AC:L/Au:N/C:P/I:N/A:N
CVSS 2 - Access VectorLOCAL
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactPARTIAL
CVSS 2 - Availability ImpactNONE
CVSS 2 - Base Score2.1
SeverityLOW
Exploitability Score3.9
Impact Score2.9
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

CVSS 3 - Version3.0
CVSS 3 - Vector StringCVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CVSS 3 - Attack VectorLOCAL
CVSS 3 - Attack ComplexityLOW
CVSS 3 - Privileges RequiredLOW
CVSS 3 - User InteractionNONE
CVSS 3 - ScopeUNCHANGED
CVSS 3 - Confidentiality ImpactHIGH
CVSS 3 - Integrity ImpactNONE
CVSS 3 - Availability ImpactNONE
CVSS 3 - Base Score5.5
CVSS 3 - Base SeverityMEDIUM
Exploitability Score1.8
Base SeverityMEDIUM

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSLinuxLinux Kernel********4.14.2

Vulnerable Software List

VendorProductVersions
Linux Linux Kernel *

References

NameSourceURLTags
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=373c4557d2aa362702c4c2d41288fb1e54990b7chttp://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=373c4557d2aa362702c4c2d412CONFIRMPatch
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.2http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.2CONFIRMRelease Notes
101969http://www.securityfocus.com/bid/101969BIDThird Party Advisory VDB Entry
RHSA-2018:0502https://access.redhat.com/errata/RHSA-2018:0502REDHAT
https://bugs.chromium.org/p/project-zero/issues/detail?id=1431https://bugs.chromium.org/p/project-zero/issues/detail?id=1431CONFIRMExploit Issue Tracking Patch
https://github.com/torvalds/linux/commit/373c4557d2aa362702c4c2d41288fb1e54990b7chttps://github.com/torvalds/linux/commit/373c4557d2aa362702c4c2d41288fb1e54990b7cCONFIRMPatch
USN-3617-1https://usn.ubuntu.com/3617-1/UBUNTU
USN-3617-2https://usn.ubuntu.com/3617-2/UBUNTU
USN-3617-3https://usn.ubuntu.com/3617-3/UBUNTU
USN-3619-1https://usn.ubuntu.com/3619-1/UBUNTU
USN-3619-2https://usn.ubuntu.com/3619-2/UBUNTU
USN-3632-1https://usn.ubuntu.com/3632-1/UBUNTU
43178https://www.exploit-db.com/exploits/43178/EXPLOIT-DBExploit Third Party Advisory VDB Entry