Open mend-bolt-for-github[bot] opened 1 year ago
:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.
:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.
:information_source: This issue was automatically re-opened by Mend because the vulnerable library in the specific branch(es) has been detected in the Mend inventory.
:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.
:information_source: This issue was automatically re-opened by Mend because the vulnerable library in the specific branch(es) has been detected in the Mend inventory.
:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.
:information_source: This issue was automatically re-opened by Mend because the vulnerable library in the specific branch(es) has been detected in the Mend inventory.
:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.
:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.
:information_source: This issue was automatically re-opened by Mend because the vulnerable library in the specific branch(es) has been detected in the Mend inventory.
CVE-2018-18281 - High Severity Vulnerability
Vulnerable Library - linuxlinux-4.6
The Linux Kernel
Library home page: https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux
Found in HEAD commit: 7c0b143b43394df131d83e9aecb3c5518edc127a
Found in base branch: master
Vulnerable Source Files (2)
/mm/mremap.c /mm/mremap.c
Vulnerability Details
Since Linux kernel version 3.2, the mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removes entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry can remain for a short time that permits access to a physical page after it has been released back to the page allocator and reused. This is fixed in the following kernel versions: 4.9.135, 4.14.78, 4.18.16, 4.19.
Publish Date: 2018-10-30
URL: CVE-2018-18281
CVSS 3 Score Details (7.8)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://nvd.nist.gov/vuln/detail/CVE-2018-18281
Release Date: 2018-10-30
Fix Resolution: kernel-rt-debug-devel - 3.10.0-1062.rt56.1022;python-perf - 3.10.0-1062,3.10.0-862.46.1,3.10.0-693.62.1,3.10.0-862.46.1,3.10.0-957.43.1,3.10.0-957.43.1,3.10.0-957.43.1,3.10.0-693.62.1,3.10.0-1062,3.10.0-862.46.1,3.10.0-1062;kernel-rt-debug - 3.10.0-1062.rt56.1022;kernel-rt-devel - 3.10.0-1062.rt56.1022;kernel-debuginfo-common-ppc64 - 3.10.0-1062,3.10.0-957.43.1,3.10.0-862.46.1;kernel-tools - 3.10.0-957.43.1,3.10.0-957.43.1,3.10.0-862.46.1,3.10.0-862.46.1,3.10.0-693.62.1,3.10.0-1062,3.10.0-693.62.1,3.10.0-862.46.1,3.10.0-957.43.1,3.10.0-1062,3.10.0-1062;kernel-rt-trace-kvm - 3.10.0-1062.rt56.1022;kernel-tools-libs-devel - 3.10.0-693.62.1,3.10.0-862.46.1,3.10.0-957.43.1,3.10.0-957.43.1,3.10.0-862.46.1,3.10.0-1062,3.10.0-1062,3.10.0-1062,3.10.0-862.46.1,3.10.0-693.62.1,3.10.0-957.43.1;kernel-tools-debuginfo - 3.10.0-862.46.1,3.10.0-693.62.1,3.10.0-957.43.1,3.10.0-1062,3.10.0-1062,3.10.0-957.43.1,3.10.0-862.46.1;kernel-rt-doc - 3.10.0-1062.rt56.1022;kernel-rt-kvm - 3.10.0-1062.rt56.1022;python-perf-debuginfo - 3.10.0-957.43.1,3.10.0-862.46.1,3.10.0-957.43.1,3.10.0-1062,3.10.0-693.62.1,3.10.0-862.46.1,3.10.0-1062;kernel-headers - 3.10.0-957.43.1,3.10.0-1062,3.10.0-957.43.1,3.10.0-1062,3.10.0-862.46.1,3.10.0-862.46.1,3.10.0-693.62.1,3.10.0-957.43.1,3.10.0-1062,3.10.0-862.46.1,3.10.0-693.62.1;kernel-rt-trace - 3.10.0-1062.rt56.1022;kernel-debuginfo-common-x86_64 - 3.10.0-957.43.1,3.10.0-1062,3.10.0-862.46.1,3.10.0-693.62.1;kernel-rt - 3.10.0-1062.rt56.1022,3.10.0-1062.rt56.1022;kernel-doc - 3.10.0-862.46.1,3.10.0-693.62.1,3.10.0-957.43.1,3.10.0-1062;kernel-abi-whitelists - 3.10.0-957.43.1,3.10.0-1062,3.10.0-693.62.1,3.10.0-862.46.1;kernel-rt-trace-devel - 3.10.0-1062.rt56.1022;kernel-rt-debug-kvm - 3.10.0-1062.rt56.1022;kernel-bootwrapper - 3.10.0-957.43.1,3.10.0-862.46.1,3.10.0-1062,3.10.0-862.46.1,3.10.0-957.43.1,3.10.0-1062,3.10.0-693.62.1;perf - 3.10.0-957.43.1,3.10.0-1062,3.10.0-862.46.1,3.10.0-1062,3.10.0-957.43.1,3.10.0-957.43.1,3.10.0-693.62.1,3.10.0-862.46.1,3.10.0-693.62.1,3.10.0-862.46.1,3.10.0-1062;kernel-debuginfo - 3.10.0-1062,3.10.0-1062,3.10.0-957.43.1,3.10.0-862.46.1,3.10.0-862.46.1,3.10.0-957.43.1,3.10.0-693.62.1;kernel-debug-devel - 3.10.0-957.43.1,3.10.0-957.43.1,3.10.0-1062,3.10.0-693.62.1,3.10.0-1062,3.10.0-862.46.1,3.10.0-862.46.1,3.10.0-693.62.1,3.10.0-957.43.1,3.10.0-862.46.1,3.10.0-1062;bpftool - 3.10.0-1062,3.10.0-957.43.1;kernel-tools-libs - 3.10.0-693.62.1,3.10.0-862.46.1,3.10.0-957.43.1,3.10.0-862.46.1,3.10.0-1062,3.10.0-957.43.1,3.10.0-957.43.1,3.10.0-1062,3.10.0-1062,3.10.0-862.46.1,3.10.0-693.62.1;perf-debuginfo - 3.10.0-693.62.1,3.10.0-862.46.1,3.10.0-862.46.1,3.10.0-957.43.1,3.10.0-1062,3.10.0-1062,3.10.0-957.43.1;kernel-debug-debuginfo - 3.10.0-1062,3.10.0-957.43.1,3.10.0-862.46.1,3.10.0-1062,3.10.0-693.62.1,3.10.0-957.43.1,3.10.0-862.46.1;kernel-debug - 3.10.0-693.62.1,3.10.0-957.43.1,3.10.0-1062,3.10.0-957.43.1,3.10.0-862.46.1,3.10.0-1062,3.10.0-862.46.1,3.10.0-1062,3.10.0-862.46.1,3.10.0-957.43.1,3.10.0-693.62.1;kernel-devel - 3.10.0-957.43.1,3.10.0-862.46.1,3.10.0-693.62.1,3.10.0-1062,3.10.0-693.62.1,3.10.0-862.46.1,3.10.0-957.43.1,3.10.0-1062,3.10.0-957.43.1,3.10.0-862.46.1,3.10.0-1062;kernel - 3.10.0-693.62.1,3.10.0-1062,3.10.0-1062,3.10.0-1062,3.10.0-957.43.1,3.10.0-862.46.1,3.10.0-1062,3.10.0-957.43.1,3.10.0-862.46.1,3.10.0-957.43.1,3.10.0-862.46.1,3.10.0-693.62.1,3.10.0-693.62.1,3.10.0-957.43.1,3.10.0-862.46.1
Step up your Open Source Security Game with Mend here