First published: Fri Mar 09 2018(Updated: )
** DISPUTED ** Race condition in the store_int_with_restart() function in arch/x86/kernel/cpu/mcheck/mce.c in the Linux kernel through 4.15.7 allows local users to cause a denial of service (panic) by leveraging root access to write to the check_interval file in a /sys/devices/system/machinecheck/machinecheck<cpu number> directory. NOTE: a third party has indicated that this report is not security relevant.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.119-1 6.12.10-1 6.12.11-1 | |
Linux Kernel | <=4.15.7 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =16.04 | |
Debian GNU/Linux | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-7995 has been classified as a denial of service vulnerability due to a race condition in the Linux kernel.
To fix CVE-2018-7995, update your Linux kernel to a version later than 4.15.7, including patched versions such as 5.10.223-1 or 6.1.123-1.
CVE-2018-7995 affects the Linux kernel up to version 4.15.7 and specific distributions including Ubuntu 14.04, Ubuntu 16.04, and Debian 7.0.
CVE-2018-7995 can be exploited by local users with root access who write to the check_interval file causing system panic.
The primary mitigation for CVE-2018-7995 is to ensure that systems are updated with the latest kernel patches that address the race condition.