CVE-2017-18208
kernel: Inifinite loop vulnerability in mm/madvise.c:madvise_willneed() function allows local denial of service
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The madvise_willneed function in mm/madvise.c in the Linux kernel before 4.14.4 allows local users to cause a denial of service (infinite loop) by triggering use of MADVISE_WILLNEED for a DAX mapping.
La funciĆ³n madvise_willneed en mm/madvise.c en el kernel de Linux, en versiones anteriores a la 4.14.4, permite que usuarios locales provoquen una denegaciĆ³n de servicio (bucle infinito) desencadenando el uso de MADVISE_WILLNEED para un mapeo DAX.
The madvise_willneed function in the Linux kernel allows local users to cause a denial of service (infinite loop) by triggering use of MADVISE_WILLNEED for a DAX mapping.
Jann Horn and Ken Johnson discovered that microprocessors utilizing speculative execution of a memory read may allow unauthorized memory reads via a sidechannel attack. This flaw is known as Spectre Variant 4. A local attacker could use this to expose sensitive information, including kernel memory. Jan H. Schonherr discovered that the Xen subsystem did not properly handle block IO merges correctly in some situations. An attacker in a guest vm could use this to cause a denial of service or possibly gain administrative privileges in the host. Various other issues were also addressed.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2018-02-28 CVE Reserved
- 2018-03-01 CVE Published
- 2024-08-05 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop')
CAPEC
References (18)
URL | Tag | Source |
---|---|---|
https://github.com/torvalds/linux/commit/6ea8d958a2c95a1d514015d4e29ba21a8c0a1a91 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6ea8d958a2c95a1d514015d4e29ba21a8c0a1a91 | 2019-10-03 | |
https://access.redhat.com/errata/RHSA-2018:2948 | 2019-10-03 | |
https://access.redhat.com/errata/RHSA-2018:3083 | 2019-10-03 | |
https://access.redhat.com/errata/RHSA-2018:3096 | 2019-10-03 | |
https://access.redhat.com/errata/RHSA-2019:3967 | 2019-10-03 | |
https://access.redhat.com/errata/RHSA-2019:4057 | 2019-10-03 | |
https://access.redhat.com/errata/RHSA-2019:4058 | 2019-10-03 | |
https://usn.ubuntu.com/3619-1 | 2019-10-03 | |
https://usn.ubuntu.com/3619-2 | 2019-10-03 | |
https://usn.ubuntu.com/3653-1 | 2019-10-03 | |
https://usn.ubuntu.com/3653-2 | 2019-10-03 | |
https://usn.ubuntu.com/3655-1 | 2019-10-03 | |
https://usn.ubuntu.com/3655-2 | 2019-10-03 | |
https://usn.ubuntu.com/3657-1 | 2019-10-03 | |
https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.4 | 2019-10-03 | |
https://access.redhat.com/security/cve/CVE-2017-18208 | 2019-12-03 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1551565 | 2019-12-03 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | < 4.14.4 Search vendor "Linux" for product "Linux Kernel" and version " < 4.14.4" | - |
Affected
|