Lucene search

K
ubuntucveUbuntu.comUB:CVE-2018-16885
HistoryJan 03, 2019 - 12:00 a.m.

CVE-2018-16885

2019-01-0300:00:00
ubuntu.com
ubuntu.com
11

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

4.9 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:N/I:N/A:C

0.001 Low

EPSS

Percentile

23.9%

A flaw was found in the Linux kernel that allows the userspace to call
memcpy_fromiovecend() and similar functions with a zero offset and buffer
length which causes the read beyond the buffer boundaries, in certain cases
causing a memory access fault and a system halt by accessing invalid memory
address. This issue only affects kernel version 3.10.x as shipped with Red
Hat Enterprise Linux 7.

Bugs

Notes

Author Note
tyhicks According to Red Hat, this flaw only affects Red Hat Enterprise Linux

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

4.9 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:N/I:N/A:C

0.001 Low

EPSS

Percentile

23.9%