Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!Close

CVE-2018-8781

Published: 23 April 2018

The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.

From the Ubuntu Security Team

Eyal Itkin discovered that the USB displaylink video adapter driver in the Linux kernel did not properly validate mmap offsets sent from userspace. A local attacker could use this to expose sensitive information (kernel memory) or possibly execute arbitrary code.

Priority

Medium

Cvss 3 Severity Score

7.8

Score breakdown

Status

Package Release Status
linux
Launchpad, Ubuntu, Debian
bionic Not vulnerable
(4.15.0-15.16)
upstream
Released (4.16~rc7)
artful
Released (4.13.0-45.50)
trusty
Released (3.13.0-151.201)
xenial
Released (4.4.0-127.153)
Patches:
Introduced by

5320918b9a87865223fd6b228e530bf30bc64d9d

Fixed by 3b82a4db8eaccce735dffd50b4d4e1578099b8e8
linux-flo
Launchpad, Ubuntu, Debian
bionic Does not exist

upstream
Released (4.16~rc7)
artful Does not exist

trusty Does not exist
(trusty was ignored [abandoned])
xenial Ignored
(abandoned)
linux-goldfish
Launchpad, Ubuntu, Debian
bionic Does not exist

upstream
Released (4.16~rc7)
artful Does not exist

trusty Does not exist
(trusty was ignored [abandoned])
xenial Ignored
(end of life, was needs-triage)
linux-grouper
Launchpad, Ubuntu, Debian
bionic Does not exist

upstream
Released (4.16~rc7)
trusty Does not exist
(trusty was ignored [abandoned])
xenial Does not exist

artful Does not exist

linux-lts-trusty
Launchpad, Ubuntu, Debian
bionic Does not exist

upstream
Released (4.16~rc7)
artful Does not exist

trusty Does not exist

xenial Does not exist

linux-lts-utopic
Launchpad, Ubuntu, Debian
bionic Does not exist

upstream
Released (4.16~rc7)
artful Does not exist

trusty Does not exist
(trusty was ignored [end of standard support])
xenial Does not exist

linux-lts-vivid
Launchpad, Ubuntu, Debian
bionic Does not exist

upstream
Released (4.16~rc7)
artful Does not exist

trusty Does not exist
(trusty was ignored [end of standard support])
xenial Does not exist

linux-lts-wily
Launchpad, Ubuntu, Debian
bionic Does not exist

upstream
Released (4.16~rc7)
artful Does not exist

trusty Does not exist
(trusty was ignored [end of standard support])
xenial Does not exist

linux-aws
Launchpad, Ubuntu, Debian
bionic Not vulnerable
(4.15.0-1003.3)
upstream
Released (4.16~rc7)
artful Does not exist

trusty
Released (4.4.0-1022.22)
xenial
Released (4.4.0-1060.69)
linux-azure
Launchpad, Ubuntu, Debian
bionic Not vulnerable
(4.15.0-1004.4)
upstream
Released (4.16~rc7)
artful Does not exist

trusty Not vulnerable
(4.15.0-1023.24~14.04.1)
xenial
Released (4.15.0-1013.13~16.04.2)
linux-euclid
Launchpad, Ubuntu, Debian
bionic Does not exist

upstream
Released (4.16~rc7)
artful Does not exist

trusty Does not exist

xenial Ignored
(was needed ESM criteria)
linux-gcp
Launchpad, Ubuntu, Debian
bionic Not vulnerable
(4.15.0-1003.3)
upstream
Released (4.16~rc7)
artful Does not exist

trusty Does not exist

xenial
Released (4.13.0-1019.23)
linux-gke
Launchpad, Ubuntu, Debian
bionic Does not exist

upstream
Released (4.16~rc7)
artful Does not exist

trusty Does not exist

xenial Ignored
(end of standard support, was needs-triage)
linux-hwe
Launchpad, Ubuntu, Debian
bionic Not vulnerable

upstream
Released (4.16~rc7)
artful Does not exist

trusty Does not exist

xenial
Released (4.13.0-45.50~16.04.1)
linux-hwe-edge
Launchpad, Ubuntu, Debian
bionic
Released (4.18.0-8.9~18.04.1)
artful Does not exist

trusty Does not exist

upstream
Released (4.16~rc7)
xenial
Released (4.13.0-45.50~16.04.1)
linux-kvm
Launchpad, Ubuntu, Debian
artful Does not exist

bionic Not vulnerable
(4.15.0-1004.4)
trusty Does not exist

upstream
Released (4.16~rc7)
xenial
Released (4.4.0-1026.31)
linux-lts-xenial
Launchpad, Ubuntu, Debian
artful Does not exist

bionic Does not exist

trusty
Released (4.4.0-127.153~14.04.1)
upstream
Released (4.16~rc7)
xenial Does not exist

linux-maguro
Launchpad, Ubuntu, Debian
artful Does not exist

bionic Does not exist

trusty Does not exist
(trusty was ignored [abandoned])
upstream
Released (4.16~rc7)
xenial Does not exist

linux-mako
Launchpad, Ubuntu, Debian
artful Does not exist

bionic Does not exist

trusty Does not exist
(trusty was ignored [abandoned])
upstream
Released (4.16~rc7)
xenial Ignored
(abandoned)
linux-manta
Launchpad, Ubuntu, Debian
artful Does not exist

bionic Does not exist

trusty Does not exist
(trusty was ignored [abandoned])
upstream
Released (4.16~rc7)
xenial Does not exist

linux-oem
Launchpad, Ubuntu, Debian
artful Does not exist

bionic Not vulnerable
(4.15.0-1002.3)
trusty Does not exist

upstream
Released (4.16~rc7)
xenial
Released (4.13.0-1030.33)
linux-raspi2
Launchpad, Ubuntu, Debian
artful
Released (4.13.0-1022.23)
bionic Not vulnerable
(4.15.0-1006.7)
trusty Does not exist

upstream
Released (4.16~rc7)
xenial
Released (4.4.0-1090.98)
linux-snapdragon
Launchpad, Ubuntu, Debian
artful
Released (4.4.0-1093.98)
bionic Not vulnerable

trusty Does not exist

upstream
Released (4.16~rc7)
xenial
Released (4.4.0-1093.98)

Severity score breakdown

Parameter Value
Base score 7.8
Attack vector Local
Attack complexity Low
Privileges required Low
User interaction None
Scope Unchanged
Confidentiality High
Integrity impact High
Availability impact High
Vector CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H