CVE-2018-10675

Current Description

The do_get_mempolicy function in mm/mempolicy.c in the Linux kernel before 4.12.9 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted system calls.

Basic Data

PublishedMay 02, 2018
Last ModifiedJuly 15, 2020
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-416
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS 2 - Access VectorLOCAL
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactCOMPLETE
CVSS 2 - Availability ImpactCOMPLETE
CVSS 2 - Base Score7.2
SeverityHIGH
Exploitability Score3.9
Impact Score10.0
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

CVSS 3 - Version3.0
CVSS 3 - Vector StringCVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS 3 - Attack VectorLOCAL
CVSS 3 - Attack ComplexityLOW
CVSS 3 - Privileges RequiredLOW
CVSS 3 - User InteractionNONE
CVSS 3 - ScopeUNCHANGED
CVSS 3 - Confidentiality ImpactHIGH
CVSS 3 - Integrity ImpactHIGH
CVSS 3 - Availability ImpactHIGH
CVSS 3 - Base Score7.8
CVSS 3 - Base SeverityHIGH
Exploitability Score1.8
Base SeverityHIGH

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSLinuxLinux Kernel********4.12.9
  • OR - Configuration 2
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationRedhatVirtualization Host4.0*******
    2.3OSRedhatEnterprise Linux Desktop6.0*******
    2.3OSRedhatEnterprise Linux Server6.0*******
    2.3OSRedhatEnterprise Linux Server Aus6.4*******
    2.3OSRedhatEnterprise Linux Server Aus6.5*******
    2.3OSRedhatEnterprise Linux Server Aus6.6*******
    2.3OSRedhatEnterprise Linux Server Aus7.2*******
    2.3OSRedhatEnterprise Linux Server Aus7.3*******
    2.3OSRedhatEnterprise Linux Server Aus7.4*******
    2.3OSRedhatEnterprise Linux Server Aus7.6*******
    2.3OSRedhatEnterprise Linux Server Eus6.7*******
    2.3OSRedhatEnterprise Linux Server Eus7.3*******
    2.3OSRedhatEnterprise Linux Server Eus7.4*******
    2.3OSRedhatEnterprise Linux Server Eus7.5*******
    2.3OSRedhatEnterprise Linux Server Eus7.6*******
    2.3OSRedhatEnterprise Linux Server Tus6.6*******
    2.3OSRedhatEnterprise Linux Server Tus7.2*******
    2.3OSRedhatEnterprise Linux Server Tus7.3*******
    2.3OSRedhatEnterprise Linux Server Tus7.4*******
    2.3OSRedhatEnterprise Linux Server Tus7.6*******
    2.3OSRedhatEnterprise Linux Workstation6.0*******
  • OR - Configuration 3
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSCanonicalUbuntu Linux14.04***lts***

Vulnerable Software List

VendorProductVersions
Redhat Enterprise Linux Workstation 6.0
Redhat Virtualization Host 4.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server Aus 6.4, 6.5, 6.6, 7.2, 7.3, 7.4, 7.6
Redhat Enterprise Linux Server Tus 6.6, 7.2, 7.3, 7.4, 7.6
Redhat Enterprise Linux Server Eus 6.7, 7.3, 7.4, 7.5, 7.6
Redhat Enterprise Linux Server 6.0
Canonical Ubuntu Linux 14.04
Linux Linux Kernel *

References

NameSourceURLTags
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=73223e4e2e3867ebf033a5a8eb2e5df0158ccc99http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=73223e4e2e3867ebf033a5a8ebMISCPatch Vendor Advisory
104093http://www.securityfocus.com/bid/104093BIDThird Party Advisory VDB Entry
RHSA-2018:2164https://access.redhat.com/errata/RHSA-2018:2164REDHATThird Party Advisory
RHSA-2018:2384https://access.redhat.com/errata/RHSA-2018:2384REDHATThird Party Advisory
RHSA-2018:2395https://access.redhat.com/errata/RHSA-2018:2395REDHATThird Party Advisory
RHSA-2018:2785https://access.redhat.com/errata/RHSA-2018:2785REDHATThird Party Advisory
RHSA-2018:2791https://access.redhat.com/errata/RHSA-2018:2791REDHATThird Party Advisory
RHSA-2018:2924https://access.redhat.com/errata/RHSA-2018:2924REDHATThird Party Advisory
RHSA-2018:2925https://access.redhat.com/errata/RHSA-2018:2925REDHATThird Party Advisory
RHSA-2018:2933https://access.redhat.com/errata/RHSA-2018:2933REDHATThird Party Advisory
RHSA-2018:3540https://access.redhat.com/errata/RHSA-2018:3540REDHATThird Party Advisory
RHSA-2018:3586https://access.redhat.com/errata/RHSA-2018:3586REDHATThird Party Advisory
RHSA-2018:3590https://access.redhat.com/errata/RHSA-2018:3590REDHATThird Party Advisory
https://github.com/torvalds/linux/commit/73223e4e2e3867ebf033a5a8eb2e5df0158ccc99https://github.com/torvalds/linux/commit/73223e4e2e3867ebf033a5a8eb2e5df0158ccc99MISCPatch Vendor Advisory
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+ExCONFIRMThird Party Advisory
USN-3754-1https://usn.ubuntu.com/3754-1/UBUNTUThird Party Advisory
https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.12.9https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.12.9MISCRelease Notes
https://www.oracle.com/security-alerts/cpujul2020.htmlhttps://www.oracle.com/security-alerts/cpujul2020.htmlMISC