ID CVE-2018-1000200
Summary The Linux Kernel versions 4.14, 4.15, and 4.16 has a null pointer dereference which can result in an out of memory (OOM) killing of large mlocked processes. The issue arises from an oom killed process's final thread calling exit_mmap(), which calls munlock_vma_pages_all() for mlocked vmas.This can happen synchronously with the oom reaper's unmap_page_range() since the vma's VM_LOCKED bit is cleared before munlocking (to determine if any other vmas share the memory and are mlocked).
References
Vulnerable Configurations
  • cpe:2.3:o:linux:linux_kernel:4.14:*:*:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:4.14:*:*:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:4.15:*:*:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:4.15:*:*:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:4.16:*:*:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:4.16:*:*:*:*:*:*:*
CVSS
Base: 4.9 (as of 31-10-2018 - 10:30)
Impact:
Exploitability:
CWE CWE-476
CAPEC
Access
VectorComplexityAuthentication
LOCAL LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE COMPLETE
cvss-vector via4 AV:L/AC:L/Au:N/C:N/I:N/A:C
redhat via4
advisories
rhsa
id RHSA-2018:2948
refmap via4
bid 104397
confirm
mlist
  • [linux-kernel] 20180417 [patch] mm, oom: fix concurrent munlock and oom reaper unmap
  • [linux-kernel] 20180424 [patch v3 for-4.17] mm, oom: fix concurrent munlock and oom reaper unmap
  • [oss-security] 20180424 CVE-2018-1000200 (Linux): Bad memory access on oom kill of large mlocked process
ubuntu
  • USN-3752-1
  • USN-3752-2
  • USN-3752-3
Last major update 31-10-2018 - 10:30
Published 05-06-2018 - 13:29
Back to Top