Unrated severityNVD Advisory· Published Oct 3, 2018· Updated Aug 5, 2024
CVE-2018-17972
CVE-2018-17972
Description
An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents.
Affected products
65- osv-coords65 versionspkg:rpm/suse/kernel-azure&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3pkg:rpm/suse/kernel-azure&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3pkg:rpm/suse/kernel-bigmem&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSSpkg:rpm/suse/kernel-default&distro=SUSE%20Enterprise%20Storage%204pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP3pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2012%20SP2pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2012%20SP3pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSSpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCLpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSSpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2012%20SP3pkg:rpm/suse/kernel-default&distro=SUSE%20OpenStack%20Cloud%207pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP3pkg:rpm/suse/kernel-ec2&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2012pkg:rpm/suse/kernel-ec2&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSSpkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP3pkg:rpm/suse/kernel-pae&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSSpkg:rpm/suse/kernel-ppc64&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSSpkg:rpm/suse/kernel-source-azure&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3pkg:rpm/suse/kernel-source-azure&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3pkg:rpm/suse/kernel-source&distro=SUSE%20Enterprise%20Storage%204pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP3pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSSpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCLpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSSpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3pkg:rpm/suse/kernel-source&distro=SUSE%20OpenStack%20Cloud%207pkg:rpm/suse/kernel-syms-azure&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3pkg:rpm/suse/kernel-syms-azure&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3pkg:rpm/suse/kernel-syms&distro=SUSE%20Enterprise%20Storage%204pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP3pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSSpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCLpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSSpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3pkg:rpm/suse/kernel-syms&distro=SUSE%20OpenStack%20Cloud%207pkg:rpm/suse/kernel-trace&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSSpkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSSpkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_34&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_34&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_30&distro=SUSE%20Enterprise%20Storage%204pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_30&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_30&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_30&distro=SUSE%20OpenStack%20Cloud%207pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_26&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP3pkg:rpm/suse/kgraft-patch-SLE12_Update_40&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSS
< 4.4.180-4.31.1+ 64 more
- (no CPE)range: < 4.4.180-4.31.1
- (no CPE)range: < 4.4.180-4.31.1
- (no CPE)range: < 3.0.101-108.95.2
- (no CPE)range: < 4.4.121-92.114.1
- (no CPE)range: < 4.4.180-94.97.1
- (no CPE)range: < 4.4.121-92.114.1
- (no CPE)range: < 4.4.180-94.97.1
- (no CPE)range: < 3.0.101-108.95.2
- (no CPE)range: < 3.12.74-60.64.115.1
- (no CPE)range: < 4.4.121-92.114.1
- (no CPE)range: < 4.4.121-92.114.1
- (no CPE)range: < 4.4.180-94.97.1
- (no CPE)range: < 3.12.61-52.154.1
- (no CPE)range: < 3.12.74-60.64.115.1
- (no CPE)range: < 4.4.121-92.114.1
- (no CPE)range: < 4.4.180-94.97.1
- (no CPE)range: < 4.4.180-94.97.1
- (no CPE)range: < 4.4.121-92.114.1
- (no CPE)range: < 4.4.180-94.97.1
- (no CPE)range: < 3.12.74-60.64.115.1
- (no CPE)range: < 3.0.101-108.95.2
- (no CPE)range: < 4.4.180-94.97.1
- (no CPE)range: < 3.0.101-108.95.2
- (no CPE)range: < 3.0.101-108.95.2
- (no CPE)range: < 4.4.180-4.31.1
- (no CPE)range: < 4.4.180-4.31.1
- (no CPE)range: < 4.4.121-92.114.1
- (no CPE)range: < 4.4.180-94.97.1
- (no CPE)range: < 3.0.101-108.95.1
- (no CPE)range: < 3.12.74-60.64.115.1
- (no CPE)range: < 4.4.121-92.114.1
- (no CPE)range: < 4.4.121-92.114.1
- (no CPE)range: < 4.4.180-94.97.1
- (no CPE)range: < 3.12.61-52.154.1
- (no CPE)range: < 3.12.74-60.64.115.1
- (no CPE)range: < 4.4.121-92.114.1
- (no CPE)range: < 4.4.180-94.97.1
- (no CPE)range: < 4.4.121-92.114.1
- (no CPE)range: < 4.4.180-4.31.1
- (no CPE)range: < 4.4.180-4.31.1
- (no CPE)range: < 4.4.121-92.114.1
- (no CPE)range: < 4.4.180-94.97.1
- (no CPE)range: < 3.0.101-108.95.1
- (no CPE)range: < 3.12.74-60.64.115.1
- (no CPE)range: < 4.4.121-92.114.1
- (no CPE)range: < 4.4.121-92.114.1
- (no CPE)range: < 4.4.180-94.97.1
- (no CPE)range: < 3.12.61-52.154.1
- (no CPE)range: < 3.12.74-60.64.115.1
- (no CPE)range: < 4.4.121-92.114.1
- (no CPE)range: < 4.4.180-94.97.1
- (no CPE)range: < 4.4.121-92.114.1
- (no CPE)range: < 3.0.101-108.95.2
- (no CPE)range: < 3.0.101-108.95.2
- (no CPE)range: < 3.12.74-60.64.115.1
- (no CPE)range: < 3.12.61-52.154.1
- (no CPE)range: < 3.12.74-60.64.115.1
- (no CPE)range: < 1-2.5.1
- (no CPE)range: < 1-2.5.1
- (no CPE)range: < 1-3.5.1
- (no CPE)range: < 1-3.5.1
- (no CPE)range: < 1-3.5.1
- (no CPE)range: < 1-3.5.1
- (no CPE)range: < 1-4.3.3
- (no CPE)range: < 1-1.5.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
21- lists.opensuse.org/opensuse-security-announce/2019-05/msg00043.htmlmitrevendor-advisoryx_refsource_SUSE
- access.redhat.com/errata/RHSA-2019:0512mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2019:0514mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2019:0831mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2019:2473mitrevendor-advisoryx_refsource_REDHAT
- usn.ubuntu.com/3821-1/mitrevendor-advisoryx_refsource_UBUNTU
- usn.ubuntu.com/3821-2/mitrevendor-advisoryx_refsource_UBUNTU
- usn.ubuntu.com/3832-1/mitrevendor-advisoryx_refsource_UBUNTU
- usn.ubuntu.com/3835-1/mitrevendor-advisoryx_refsource_UBUNTU
- usn.ubuntu.com/3871-1/mitrevendor-advisoryx_refsource_UBUNTU
- usn.ubuntu.com/3871-3/mitrevendor-advisoryx_refsource_UBUNTU
- usn.ubuntu.com/3871-4/mitrevendor-advisoryx_refsource_UBUNTU
- usn.ubuntu.com/3871-5/mitrevendor-advisoryx_refsource_UBUNTU
- usn.ubuntu.com/3880-1/mitrevendor-advisoryx_refsource_UBUNTU
- usn.ubuntu.com/3880-2/mitrevendor-advisoryx_refsource_UBUNTU
- www.securityfocus.com/bid/105525mitrevdb-entryx_refsource_BID
- lists.debian.org/debian-lts-announce/2019/03/msg00017.htmlmitremailing-listx_refsource_MLIST
- lists.debian.org/debian-lts-announce/2019/03/msg00034.htmlmitremailing-listx_refsource_MLIST
- lists.debian.org/debian-lts-announce/2019/04/msg00004.htmlmitremailing-listx_refsource_MLIST
- marc.infomitrex_refsource_MISC
- support.f5.com/csp/article/K27673650mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.