vulnerability
Ubuntu: (Multiple Advisories) (CVE-2018-1000199): Linux kernel vulnerabilities
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
5 | (AV:L/AC:L/Au:N/C:N/I:N/A:C) | May 1, 2018 | May 17, 2018 | Jan 23, 2025 |
Severity
5
CVSS
(AV:L/AC:L/Au:N/C:N/I:N/A:C)
Published
May 1, 2018
Added
May 17, 2018
Modified
Jan 23, 2025
Description
The Linux Kernel version 3.18 contains a dangerous feature vulnerability in modify_user_hw_breakpoint() that can result in crash and possibly memory corruption. This attack appear to be exploitable via local code execution and the ability to use ptrace. This vulnerability appears to have been fixed in git commit f67b15037a7a50c57f72e69a6d59941ad90a0f0f.
Solution(s)
ubuntu-upgrade-linux-image-3-13-0-147-genericubuntu-upgrade-linux-image-3-13-0-147-generic-lpaeubuntu-upgrade-linux-image-3-13-0-147-lowlatencyubuntu-upgrade-linux-image-3-13-0-147-powerpc-e500ubuntu-upgrade-linux-image-3-13-0-147-powerpc-e500mcubuntu-upgrade-linux-image-3-13-0-147-powerpc-smpubuntu-upgrade-linux-image-3-13-0-147-powerpc64-embubuntu-upgrade-linux-image-3-13-0-147-powerpc64-smpubuntu-upgrade-linux-image-3-2-0-134-genericubuntu-upgrade-linux-image-3-2-0-134-generic-paeubuntu-upgrade-linux-image-3-2-0-134-highbankubuntu-upgrade-linux-image-3-2-0-134-omapubuntu-upgrade-linux-image-3-2-0-134-powerpc-smpubuntu-upgrade-linux-image-3-2-0-134-powerpc64-smpubuntu-upgrade-linux-image-3-2-0-134-virtualubuntu-upgrade-linux-image-4-13-0-1015-gcpubuntu-upgrade-linux-image-4-13-0-1016-azureubuntu-upgrade-linux-image-4-13-0-1019-raspi2ubuntu-upgrade-linux-image-4-13-0-1026-oemubuntu-upgrade-linux-image-4-13-0-41-genericubuntu-upgrade-linux-image-4-13-0-41-generic-lpaeubuntu-upgrade-linux-image-4-13-0-41-lowlatencyubuntu-upgrade-linux-image-4-4-0-1019-awsubuntu-upgrade-linux-image-4-4-0-1023-kvmubuntu-upgrade-linux-image-4-4-0-1057-awsubuntu-upgrade-linux-image-4-4-0-1089-raspi2ubuntu-upgrade-linux-image-4-4-0-1092-snapdragonubuntu-upgrade-linux-image-4-4-0-124-genericubuntu-upgrade-linux-image-4-4-0-124-generic-lpaeubuntu-upgrade-linux-image-4-4-0-124-lowlatencyubuntu-upgrade-linux-image-4-4-0-124-powerpc-e500mcubuntu-upgrade-linux-image-4-4-0-124-powerpc-smpubuntu-upgrade-linux-image-4-4-0-124-powerpc64-embubuntu-upgrade-linux-image-4-4-0-124-powerpc64-smpubuntu-upgrade-linux-image-4-4-0-9027-euclidubuntu-upgrade-linux-image-awsubuntu-upgrade-linux-image-azureubuntu-upgrade-linux-image-euclidubuntu-upgrade-linux-image-gcpubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-hwe-16-04ubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-generic-lpae-hwe-16-04ubuntu-upgrade-linux-image-generic-lpae-lts-trustyubuntu-upgrade-linux-image-generic-lpae-lts-xenialubuntu-upgrade-linux-image-generic-lts-trustyubuntu-upgrade-linux-image-generic-lts-xenialubuntu-upgrade-linux-image-generic-paeubuntu-upgrade-linux-image-gkeubuntu-upgrade-linux-image-highbankubuntu-upgrade-linux-image-kvmubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-lowlatency-hwe-16-04ubuntu-upgrade-linux-image-lowlatency-lts-xenialubuntu-upgrade-linux-image-oemubuntu-upgrade-linux-image-omapubuntu-upgrade-linux-image-powerpcubuntu-upgrade-linux-image-powerpc-e500ubuntu-upgrade-linux-image-powerpc-e500mcubuntu-upgrade-linux-image-powerpc-e500mc-lts-xenialubuntu-upgrade-linux-image-powerpc-smpubuntu-upgrade-linux-image-powerpc-smp-lts-xenialubuntu-upgrade-linux-image-powerpc64-embubuntu-upgrade-linux-image-powerpc64-emb-lts-xenialubuntu-upgrade-linux-image-powerpc64-smpubuntu-upgrade-linux-image-powerpc64-smp-lts-xenialubuntu-upgrade-linux-image-raspi2ubuntu-upgrade-linux-image-snapdragon

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.