The walk_hugetlb_range function in mm/pagewalk.c in the Linux kernel before 4.14.2 mishandles holes in hugetlb ranges, which allows local users to obtain sensitive information from uninitialized kernel memory via crafted use of the mincore() system call.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
https://usn.ubuntu.com/3617-1/ | vendor advisory |
https://usn.ubuntu.com/3619-2/ | vendor advisory |
https://bugs.chromium.org/p/project-zero/issues/detail?id=1431 | patch issue tracking exploit |
https://usn.ubuntu.com/3617-3/ | vendor advisory |
https://www.exploit-db.com/exploits/43178/ | third party advisory vdb entry exploit |
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.2 | release notes |
https://usn.ubuntu.com/3632-1/ | vendor advisory |
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=373c4557d2aa362702c4c2d41288fb1e54990b7c | patch |
https://access.redhat.com/errata/RHSA-2018:0502 | vendor advisory |
https://usn.ubuntu.com/3617-2/ | vendor advisory |
https://github.com/torvalds/linux/commit/373c4557d2aa362702c4c2d41288fb1e54990b7c | patch |
https://usn.ubuntu.com/3619-1/ | vendor advisory |
http://www.securityfocus.com/bid/101969 | third party advisory vdb entry |