CVE-2017-12190
MEDIUM
6,5
Source: [email protected]
Attack Vector: local
Attack Complexity: low
Privileges Required: low
User Interaction: none
Scope: changed
Confidentiality: none
Integrity: none
Availability: high
MEDIUM
4,9
Source: [email protected]
Access Vector: local
Access Complexity: low
Authentication: none
Confidentiality: none
Integrity: none
Availability: complete
Description
AI Translation Available
The bio_map_user_iov and bio_unmap_user functions in block/bio.c in the Linux kernel before 4.13.8 do unbalanced refcounting when a SCSI I/O vector has small consecutive buffers belonging to the same page. The bio_add_pc_page function merges them into one, but the page reference is never dropped. This causes a memory leak and possible system lockup (exploitable against the host OS by a guest OS user, if a SCSI disk is passed through to a virtual machine) due to an out-of-memory condition.
EPSS (Exploit Prediction Scoring System)
Trend Analysis
EPSS (Exploit Prediction Scoring System)
Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.
EPSS Score
0,0009
Percentile
0,3th
Updated
EPSS Score Trend (Last 90 Days)
400
Uncontrolled Resource Consumption
DraftCommon Consequences
Security Scopes Affected:
Availability
Access Control
Other
Potential Impacts:
Dos: Crash, Exit, Or Restart
Dos: Resource Consumption (Cpu)
Dos: Resource Consumption (Memory)
Dos: Resource Consumption (Other)
Bypass Protection Mechanism
Other
Applicable Platforms
All platforms may be affected
772
Missing Release of Resource after Effective Lifetime
DraftCommon Consequences
Security Scopes Affected:
Availability
Potential Impacts:
Dos: Resource Consumption (Other)
Dos: Resource Consumption (Memory)
Dos: Resource Consumption (Cpu)
Applicable Platforms
Technologies:
Mobile
Operating System
Linux Kernel by Linux
Version Range Affected
To
4.13.7
(inclusive)
CPE Identifier
View Detailed Analysis
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2b04e…
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=95d78…
https://access.redhat.com/errata/RHSA-2018:0654
https://access.redhat.com/errata/RHSA-2018:0676
https://access.redhat.com/errata/RHSA-2018:1062
https://access.redhat.com/errata/RHSA-2018:1854
https://access.redhat.com/errata/RHSA-2019:1170
https://access.redhat.com/errata/RHSA-2019:1190
https://bugzilla.redhat.com/show_bug.cgi?id=1495089
http://seclists.org/oss-sec/2017/q4/52
https://github.com/torvalds/linux/commit/2b04e8f6bbb196cab4b232af0f8d48ff2c7a80…
https://github.com/torvalds/linux/commit/95d78c28b5a85bacbc29b8dba7c04babb9b0d4…
https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
https://support.f5.com/csp/article/K93472064?utm_source=f5support&%3Butm_med…
https://usn.ubuntu.com/3582-1/
https://usn.ubuntu.com/3582-2/
https://usn.ubuntu.com/3583-1/
https://usn.ubuntu.com/3583-2/
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.8
http://www.securityfocus.com/bid/101911
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2b04e…
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=95d78…
https://access.redhat.com/errata/RHSA-2018:0654
https://access.redhat.com/errata/RHSA-2018:0676
https://access.redhat.com/errata/RHSA-2018:1062
https://access.redhat.com/errata/RHSA-2018:1854
https://access.redhat.com/errata/RHSA-2019:1170
https://access.redhat.com/errata/RHSA-2019:1190
https://bugzilla.redhat.com/show_bug.cgi?id=1495089
http://seclists.org/oss-sec/2017/q4/52
https://github.com/torvalds/linux/commit/2b04e8f6bbb196cab4b232af0f8d48ff2c7a80…
https://github.com/torvalds/linux/commit/95d78c28b5a85bacbc29b8dba7c04babb9b0d4…
https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
https://support.f5.com/csp/article/K93472064?utm_source=f5support&%3Butm_med…
https://usn.ubuntu.com/3582-1/
https://usn.ubuntu.com/3582-2/
https://usn.ubuntu.com/3583-1/
https://usn.ubuntu.com/3583-2/
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.8
http://www.securityfocus.com/bid/101911