CVE编号
CVE-2018-18281利用情况
暂无补丁情况
官方补丁披露时间
2018-10-31漏洞描述
由于Linux内核版本3.2,mremap()SysCall在丢弃可分页锁后执行TLB刷新。如果SysCall(如FUNTEGATE()从处于mremap()中间的任务的可分页中删除条目,则陈旧的TLB条目可以保留很短的时间,允许在将其释放回页面分配器并重用后访问物理页面。这在以下内核版本中是固定的:4.9.135、4.14.78、4.18.16、4.19。 解决建议
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:https://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next.git/commit/?id=c30f1fc041b74ecdb072dd44f858750414b8b19f
参考链接 |
|
---|---|
http://packetstormsecurity.com/files/150001/Linux-mremap-TLB-Flush-Too-Late.html | |
http://www.openwall.com/lists/oss-security/2018/10/29/5 | |
http://www.securityfocus.com/bid/105761 | |
http://www.securityfocus.com/bid/106503 | |
https://access.redhat.com/errata/RHSA-2019:0831 | |
https://access.redhat.com/errata/RHSA-2019:2029 | |
https://access.redhat.com/errata/RHSA-2019:2043 | |
https://access.redhat.com/errata/RHSA-2020:0036 | |
https://access.redhat.com/errata/RHSA-2020:0100 | |
https://access.redhat.com/errata/RHSA-2020:0103 | |
https://access.redhat.com/errata/RHSA-2020:0179 | |
https://bugs.chromium.org/p/project-zero/issues/detail?id=1695 | |
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.78 | |
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.18.16 | |
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.135 | |
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id... | |
https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html | |
https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html | |
https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html | |
https://usn.ubuntu.com/3832-1/ | |
https://usn.ubuntu.com/3835-1/ | |
https://usn.ubuntu.com/3871-1/ | |
https://usn.ubuntu.com/3871-3/ | |
https://usn.ubuntu.com/3871-4/ | |
https://usn.ubuntu.com/3871-5/ | |
https://usn.ubuntu.com/3880-1/ | |
https://usn.ubuntu.com/3880-2/ |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
系统 | canonical | ubuntu_linux | 12.04 | - | |||||
运行在以下环境 | |||||||||
系统 | canonical | ubuntu_linux | 14.04 | - | |||||
运行在以下环境 | |||||||||
系统 | canonical | ubuntu_linux | 16.04 | - | |||||
运行在以下环境 | |||||||||
系统 | canonical | ubuntu_linux | 18.04 | - | |||||
运行在以下环境 | |||||||||
系统 | canonical | ubuntu_linux | 18.10 | - | |||||
运行在以下环境 | |||||||||
系统 | debian | debian_linux | 8.0 | - | |||||
运行在以下环境 | |||||||||
系统 | linux | linux_kernel | * |
From (including) 3.2 |
Up to (excluding) 4.9.135 |
||||
运行在以下环境 | |||||||||
系统 | linux | linux_kernel | * |
From (including) 4.14.79 |
Up to (excluding) 4.18.16 |
||||
运行在以下环境 | |||||||||
系统 | linux | linux_kernel | * |
From (including) 4.18.17 |
Up to (excluding) 4.19 |
||||
运行在以下环境 | |||||||||
系统 | linux | linux_kernel | * |
From (including) 4.9.136 |
Up to (excluding) 4.14.78 |
||||
运行在以下环境 | |||||||||
系统 | redhat_7 | bpftool | * |
Up to (excluding) 0:3.10.0-1062.el7 |
|||||
运行在以下环境 | |||||||||
系统 | redhat_7 | kernel-rt | * |
Up to (excluding) 0:3.10.0-1062.rt56.1022.el7 |
|||||
运行在以下环境 | |||||||||
系统 | sles_12 | kernel-default-extra | * |
Up to (excluding) 4.12.14-120 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_14.04_lts | linux | * |
Up to (excluding) 3.13.0-165.215 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_16.04_lts | linux | * |
Up to (excluding) 4.4.0-142.168 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_16.04_lts | linux-aws-hwe | * |
Up to (excluding) 4.15.0-1032.34~16.04.1 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_18.04_lts | linux | * |
Up to (excluding) 4.15.0-44.47 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_18.10 | linux | * |
Up to (excluding) 4.18.0-12.13 |
|||||
- 攻击路径 本地
- 攻击复杂度 复杂
- 权限要求 普通权限
- 影响范围 有限影响
- EXP成熟度 未验证
- 补丁情况 官方补丁
- 数据保密性 无影响
- 数据完整性 无影响
- 服务器危害 无影响
- 全网数量 100
还没有评论,来说两句吧...