CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS
Percentile
78.2%
There is a heap-based buffer overflow in libxsmm_sparse_csc_reader at
generator_spgemm_csc_reader.c in LIBXSMM 1.10, a different vulnerability
than CVE-2018-20542 (which is in a different part of the source code and is
seen at different addresses).
bugzilla.redhat.com/show_bug.cgi?id=1652632
github.com/hfp/libxsmm/commit/151481489192e6d1997f8bde52c5c425ea41741d
github.com/hfp/libxsmm/issues/287
launchpad.net/bugs/cve/CVE-2018-20541
nvd.nist.gov/vuln/detail/CVE-2018-20541
security-tracker.debian.org/tracker/CVE-2018-20541
www.cve.org/CVERecord?id=CVE-2018-20541
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS
Percentile
78.2%