Rapid7 Vulnerability & Exploit Database

Ubuntu: (Multiple Advisories) (CVE-2018-1000199): Linux kernel vulnerabilities

Back to Search

Ubuntu: (Multiple Advisories) (CVE-2018-1000199): Linux kernel vulnerabilities

Severity
5
CVSS
(AV:L/AC:L/Au:N/C:N/I:N/A:C)
Published
05/01/2018
Created
07/25/2018
Added
05/17/2018
Modified
08/25/2021

Description

The Linux Kernel version 3.18 contains a dangerous feature vulnerability in modify_user_hw_breakpoint() that can result in crash and possibly memory corruption. This attack appear to be exploitable via local code execution and the ability to use ptrace. This vulnerability appears to have been fixed in git commit f67b15037a7a50c57f72e69a6d59941ad90a0f0f.

Solution(s)

  • ubuntu-upgrade-linux-image-3-13-0-147-generic
  • ubuntu-upgrade-linux-image-3-13-0-147-generic-lpae
  • ubuntu-upgrade-linux-image-3-13-0-147-lowlatency
  • ubuntu-upgrade-linux-image-3-13-0-147-powerpc-e500
  • ubuntu-upgrade-linux-image-3-13-0-147-powerpc-e500mc
  • ubuntu-upgrade-linux-image-3-13-0-147-powerpc-smp
  • ubuntu-upgrade-linux-image-3-13-0-147-powerpc64-emb
  • ubuntu-upgrade-linux-image-3-13-0-147-powerpc64-smp
  • ubuntu-upgrade-linux-image-3-2-0-134-generic
  • ubuntu-upgrade-linux-image-3-2-0-134-generic-pae
  • ubuntu-upgrade-linux-image-3-2-0-134-highbank
  • ubuntu-upgrade-linux-image-3-2-0-134-omap
  • ubuntu-upgrade-linux-image-3-2-0-134-powerpc-smp
  • ubuntu-upgrade-linux-image-3-2-0-134-powerpc64-smp
  • ubuntu-upgrade-linux-image-3-2-0-134-virtual
  • ubuntu-upgrade-linux-image-4-13-0-1015-gcp
  • ubuntu-upgrade-linux-image-4-13-0-1016-azure
  • ubuntu-upgrade-linux-image-4-13-0-1019-raspi2
  • ubuntu-upgrade-linux-image-4-13-0-1026-oem
  • ubuntu-upgrade-linux-image-4-13-0-41-generic
  • ubuntu-upgrade-linux-image-4-13-0-41-generic-lpae
  • ubuntu-upgrade-linux-image-4-13-0-41-lowlatency
  • ubuntu-upgrade-linux-image-4-4-0-1019-aws
  • ubuntu-upgrade-linux-image-4-4-0-1023-kvm
  • ubuntu-upgrade-linux-image-4-4-0-1057-aws
  • ubuntu-upgrade-linux-image-4-4-0-1089-raspi2
  • ubuntu-upgrade-linux-image-4-4-0-1092-snapdragon
  • ubuntu-upgrade-linux-image-4-4-0-124-generic
  • ubuntu-upgrade-linux-image-4-4-0-124-generic-lpae
  • ubuntu-upgrade-linux-image-4-4-0-124-lowlatency
  • ubuntu-upgrade-linux-image-4-4-0-124-powerpc-e500mc
  • ubuntu-upgrade-linux-image-4-4-0-124-powerpc-smp
  • ubuntu-upgrade-linux-image-4-4-0-124-powerpc64-emb
  • ubuntu-upgrade-linux-image-4-4-0-124-powerpc64-smp
  • ubuntu-upgrade-linux-image-4-4-0-9027-euclid
  • ubuntu-upgrade-linux-image-aws
  • ubuntu-upgrade-linux-image-azure
  • ubuntu-upgrade-linux-image-euclid
  • ubuntu-upgrade-linux-image-gcp
  • ubuntu-upgrade-linux-image-generic
  • ubuntu-upgrade-linux-image-generic-hwe-16-04
  • ubuntu-upgrade-linux-image-generic-lpae
  • ubuntu-upgrade-linux-image-generic-lpae-hwe-16-04
  • ubuntu-upgrade-linux-image-generic-lpae-lts-trusty
  • ubuntu-upgrade-linux-image-generic-lpae-lts-xenial
  • ubuntu-upgrade-linux-image-generic-lts-trusty
  • ubuntu-upgrade-linux-image-generic-lts-xenial
  • ubuntu-upgrade-linux-image-generic-pae
  • ubuntu-upgrade-linux-image-gke
  • ubuntu-upgrade-linux-image-highbank
  • ubuntu-upgrade-linux-image-kvm
  • ubuntu-upgrade-linux-image-lowlatency
  • ubuntu-upgrade-linux-image-lowlatency-hwe-16-04
  • ubuntu-upgrade-linux-image-lowlatency-lts-xenial
  • ubuntu-upgrade-linux-image-oem
  • ubuntu-upgrade-linux-image-omap
  • ubuntu-upgrade-linux-image-powerpc
  • ubuntu-upgrade-linux-image-powerpc-e500
  • ubuntu-upgrade-linux-image-powerpc-e500mc
  • ubuntu-upgrade-linux-image-powerpc-e500mc-lts-xenial
  • ubuntu-upgrade-linux-image-powerpc-smp
  • ubuntu-upgrade-linux-image-powerpc-smp-lts-xenial
  • ubuntu-upgrade-linux-image-powerpc64-emb
  • ubuntu-upgrade-linux-image-powerpc64-emb-lts-xenial
  • ubuntu-upgrade-linux-image-powerpc64-smp
  • ubuntu-upgrade-linux-image-powerpc64-smp-lts-xenial
  • ubuntu-upgrade-linux-image-raspi2
  • ubuntu-upgrade-linux-image-snapdragon

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;