Lucene search

K
ubuntucveUbuntu.comUB:CVE-2018-12886
HistoryMay 22, 2019 - 12:00 a.m.

CVE-2018-12886

2019-05-2200:00:00
ubuntu.com
ubuntu.com
7

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.003 Low

EPSS

Percentile

69.0%

stack_protect_prologue in cfgexpand.c and stack_protect_epilogue in
function.c in GNU Compiler Collection (GCC) 4.1 through 8 (under certain
circumstances) generate instruction sequences when targeting ARM targets
that spill the address of the stack protector guard, which allows an
attacker to bypass the protection of -fstack-protector,
-fstack-protector-all, -fstack-protector-strong, and
-fstack-protector-explicit against stack overflow by controlling what the
stack canary is compared against.

Bugs

Notes

Author Note
mdeslaur Upstream has fixed this in GCC9 only as of 2019-05-30. 32-bit ARM only, risky backport, and would require archive rebuild. Setting priority as low for now, we may decide this issue is not worth fixing in stable releases.
sbeattie 14.04 LTS (trusty) Pro Infra and 16.04 LTS (xenial) Pro Infra do not support 32-bit Arm as an architecture.

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.003 Low

EPSS

Percentile

69.0%