7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
4.6 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:P/A:P
Linux kernel is vulnerable to memory corruption vulnerability. This is because the ALSA sequencer core initializes the event pool on demand by invoking snd_seq_pool_init() when the first write happens and the pool is empty. A user can reset the pool size manually via ioctl concurrently causing an out-of-bounds access.
lists.opensuse.org/opensuse-security-announce/2018-03/msg00067.html
mailman.alsa-project.org/pipermail/alsa-devel/2018-February/132026.html
www.securityfocus.com/bid/103605
access.redhat.com/articles/3527791
access.redhat.com/errata/RHSA-2018:2384
access.redhat.com/errata/RHSA-2018:2390
access.redhat.com/errata/RHSA-2018:2395
access.redhat.com/errata/RHSA-2018:2948
access.redhat.com/errata/RHSA-2019:1483
access.redhat.com/errata/RHSA-2019:1487
access.redhat.com/security/updates/classification/#important
access.redhat.com/security/vulnerabilities/L1TF
bugzilla.redhat.com/show_bug.cgi?id=1550142
git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d15d662e89fc667b90cd294b0eb45694e33144da
help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
lists.debian.org/debian-lts-announce/2018/05/msg00000.html
usn.ubuntu.com/3631-1/
usn.ubuntu.com/3631-2/
usn.ubuntu.com/3798-1/
usn.ubuntu.com/3798-2/
www.debian.org/security/2018/dsa-4187
www.debian.org/security/2018/dsa-4188
www.oracle.com/security-alerts/cpujul2020.html
www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
4.6 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:P/A:P