{"id":"CVE-2018-1000199","details":"The Linux Kernel version 3.18 contains a dangerous feature vulnerability in modify_user_hw_breakpoint() that can result in crash and possibly memory corruption. This attack appear to be exploitable via local code execution and the ability to use ptrace. This vulnerability appears to have been fixed in git commit f67b15037a7a50c57f72e69a6d59941ad90a0f0f.","modified":"2026-03-15T22:25:12.407300Z","published":"2018-05-24T13:29:01.290Z","related":["SUSE-SU-2018:1222-1","SUSE-SU-2018:1223-1","SUSE-SU-2018:1224-1","SUSE-SU-2018:1225-1","SUSE-SU-2018:1226-1","SUSE-SU-2018:1227-1","SUSE-SU-2018:1228-1","SUSE-SU-2018:1229-1","SUSE-SU-2018:1230-1","SUSE-SU-2018:1231-1","SUSE-SU-2018:1232-1","SUSE-SU-2018:1233-1","SUSE-SU-2018:1234-1","SUSE-SU-2018:1235-1","SUSE-SU-2018:1236-1","SUSE-SU-2018:1237-1","SUSE-SU-2018:1238-1","SUSE-SU-2018:1239-1","SUSE-SU-2018:1240-1","SUSE-SU-2018:1241-1","SUSE-SU-2018:1242-1","SUSE-SU-2018:1243-1","SUSE-SU-2018:1244-1","SUSE-SU-2018:1245-1","SUSE-SU-2018:1246-1","SUSE-SU-2018:1247-1","SUSE-SU-2018:1248-1","SUSE-SU-2018:1249-1","SUSE-SU-2018:1250-1","SUSE-SU-2018:1251-1","SUSE-SU-2018:1252-1","SUSE-SU-2018:1253-1","SUSE-SU-2018:1254-1","SUSE-SU-2018:1255-1","SUSE-SU-2018:1256-1","SUSE-SU-2018:1257-1","SUSE-SU-2018:1258-1","SUSE-SU-2018:1259-1","SUSE-SU-2018:1260-1","SUSE-SU-2018:1261-1","SUSE-SU-2018:1262-1","SUSE-SU-2018:1263-1","SUSE-SU-2018:1264-1","SUSE-SU-2018:1266-1","SUSE-SU-2018:1267-1","SUSE-SU-2018:1268-1","SUSE-SU-2018:1269-1","SUSE-SU-2018:1270-1","SUSE-SU-2018:1272-1","SUSE-SU-2018:1273-1","SUSE-SU-2018:1366-1","SUSE-SU-2018:1368-1","SUSE-SU-2018:1374-1","SUSE-SU-2018:1375-1","SUSE-SU-2018:1376-1","SUSE-SU-2018:1508-1","SUSE-SU-2018:1525-1","SUSE-SU-2018:1550-1","SUSE-SU-2018:1551-1","SUSE-SU-2018:1816-1","SUSE-SU-2018:1846-1","SUSE-SU-2018:1855-1","SUSE-SU-2018:1855-2","SUSE-SU-2020:1587-1","SUSE-SU-2020:1599-1","SUSE-SU-2020:1602-1","SUSE-SU-2020:1603-1","SUSE-SU-2020:1604-1","SUSE-SU-2020:1605-1","SUSE-SU-2020:1646-1","SUSE-SU-2020:1656-1","SUSE-SU-2020:1663-1","SUSE-SU-2020:1671-1","SUSE-SU-2020:1754-1","SUSE-SU-2020:1758-1","SUSE-SU-2020:1775-1","SUSE-SU-2020:2156-1","SUSE-SU-2020:2478-1","SUSE-SU-2020:2487-1","openSUSE-SU-2020:0801-1"],"references":[{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1347"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1354"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3641-1/"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1318"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1348"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3641-2/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2018/dsa-4187"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1040806"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1345"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1355"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1374"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html"},{"type":"ADVISORY","url":"https://www.debian.org/security/2018/dsa-4188"},{"type":"FIX","url":"https://lkml.org/lkml/2018/4/6/813"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"3.18"}]},{"events":[{"introduced":"0"},{"last_affected":"12.04"}]},{"events":[{"introduced":"0"},{"last_affected":"14.04"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"17.10"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.2"}]},{"events":[{"introduced":"0"},{"last_affected":"7.3"}]},{"events":[{"introduced":"0"},{"last_affected":"7.4"}]},{"events":[{"introduced":"0"},{"last_affected":"7.5"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.2"}]},{"events":[{"introduced":"0"},{"last_affected":"7.3"}]},{"events":[{"introduced":"0"},{"last_affected":"7.4"}]},{"events":[{"introduced":"0"},{"last_affected":"7.3"}]},{"events":[{"introduced":"0"},{"last_affected":"7.4"}]},{"events":[{"introduced":"0"},{"last_affected":"7.5"}]},{"events":[{"introduced":"0"},{"last_affected":"7.2"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-1000199.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}