Lucene search

K
ubuntucveUbuntu.comUB:CVE-2018-12714
HistoryJun 24, 2018 - 12:00 a.m.

CVE-2018-12714

2018-06-2400:00:00
ubuntu.com
ubuntu.com
14

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.006 Low

EPSS

Percentile

78.8%

An issue was discovered in the Linux kernel through 4.17.2. The filter
parsing in kernel/trace/trace_events_filter.c could be called with no
filter, which is an N=0 case when it expected at least one line to have
been read, thus making the N-1 index invalid. This allows attackers to
cause a denial of service (slab out-of-bounds write) or possibly have
unspecified other impact via crafted perf_event_open and mmap system calls.

OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchlinux-azure-edge< anyUNKNOWN
ubuntu18.04noarchlinux-hwe-edge< 4.18.0-8.9~18.04.1UNKNOWN

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.006 Low

EPSS

Percentile

78.8%