oss-sec mailing list archives
CVE-2018-14656: Linux kernel: arbitrary kernel memory dump into the dmesg log
From: Vladis Dronov <vdronov () redhat com>
Date: Thu, 4 Oct 2018 05:14:42 -0400 (EDT)
Heololo, A missing address check in the callers of the show_opcodes() in the Linux kernel allows an attacker to dump the kernel memory at an arbitrary kernel address into the dmesg log. This affects the upstream Linux kernel as it was introduced by ba54d856a9d8 and 7cccf0725cf7, both since v4.18-rc1 and fixed by 342db04ae712 since v4.19-rc2. The CVE-2018-14656 was assigned to this flaw, I would suggest to use it in public communications regarding this flaw. References: https://bugzilla.redhat.com/show_bug.cgi?id=1629940 https://bugs.chromium.org/p/project-zero/issues/detail?id=1650 https://lore.kernel.org/lkml/20180828154901.112726-1-jannh () google com/T/ An upstream patch: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=342db04ae71273322f0011384a9ed414df8bdae4 Best regards, Vladis Dronov | Red Hat, Inc. | Product Security Engineer
Current thread:
- CVE-2018-14656: Linux kernel: arbitrary kernel memory dump into the dmesg log Vladis Dronov (Oct 04)