CVE-2018-17972Race Condition in Kernel

Severity
5.5MEDIUMNVD
EPSS
0.1%
top 82.56%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 3
Latest updateMay 13

Description

An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents.

CVSS vector

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:NExploitability: 1.8 | Impact: 3.6

Affected Packages5 packages

Also affects: Debian Linux 8.0, Ubuntu Linux 12.04, 14.04, 16.04, 18.04, 18.10, Enterprise Linux 7.6

Patches

🔴Vulnerability Details

5
GHSA
GHSA-qgp4-5xqg-pc3p: An issue was discovered in the proc_pid_stack function in fs/proc/base2022-05-13
Project0
Mitigations are attack surface, too - Project Zero2020-02-01
OSV
linux vulnerabilities2019-02-04
CVEList
CVE-2018-17972: An issue was discovered in the proc_pid_stack function in fs/proc/base2018-10-03
OSV
CVE-2018-17972: An issue was discovered in the proc_pid_stack function in fs/proc/base2018-10-03

📋Vendor Advisories

12
Ubuntu
Linux kernel (Azure) vulnerabilities2019-02-07
Ubuntu
Linux kernel (Trusty HWE) vulnerabilities2019-02-04
Ubuntu
Linux kernel (AWS, GCP, KVM, OEM, Raspberry Pi 2) vulnerabilities2019-02-04
Ubuntu
Linux kernel vulnerabilities2019-02-04
Ubuntu
Linux kernel (HWE) vulnerabilities2019-02-04

💬Community

2
Bugzilla
CVE-2018-17972 kernel: Unprivileged users able to inspect kernel stacks of arbitrary tasks [fedora-all]2018-10-05
Bugzilla
CVE-2018-17972 kernel: Unprivileged users able to inspect kernel stacks of arbitrary tasks2018-10-05
CVE-2018-17972 — Race Condition in Linux Kernel | cvebase