CVE-2018-16880

A flaw was found in the Linux kernel's handle_rx() function in the [vhost_net] driver. A malicious virtual guest, under specific conditions, can trigger an out-of-bounds write in a kmalloc-8 slab on a virtual host which may lead to a kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out. Versions from v4.16 and newer are vulnerable.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00037.html Mailing List Third Party Advisory
http://www.securityfocus.com/bid/106735 Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16880 Issue Tracking Patch Third Party Advisory
https://support.f5.com/csp/article/K03593314 Third Party Advisory
https://usn.ubuntu.com/3903-1/ Third Party Advisory
https://usn.ubuntu.com/3903-2/ Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00037.html Mailing List Third Party Advisory
http://www.securityfocus.com/bid/106735 Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16880 Issue Tracking Patch Third Party Advisory
https://support.f5.com/csp/article/K03593314 Third Party Advisory
https://usn.ubuntu.com/3903-1/ Third Party Advisory
https://usn.ubuntu.com/3903-2/ Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*

History

21 Nov 2024, 03:53

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00037.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00037.html - Mailing List, Third Party Advisory
References () http://www.securityfocus.com/bid/106735 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/106735 - Third Party Advisory, VDB Entry
References () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16880 - Issue Tracking, Patch, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16880 - Issue Tracking, Patch, Third Party Advisory
References () https://support.f5.com/csp/article/K03593314 - Third Party Advisory () https://support.f5.com/csp/article/K03593314 - Third Party Advisory
References () https://usn.ubuntu.com/3903-1/ - Third Party Advisory () https://usn.ubuntu.com/3903-1/ - Third Party Advisory
References () https://usn.ubuntu.com/3903-2/ - Third Party Advisory () https://usn.ubuntu.com/3903-2/ - Third Party Advisory

19 Jul 2023, 00:54

Type Values Removed Values Added
References (CONFIRM) https://support.f5.com/csp/article/K03593314 - (CONFIRM) https://support.f5.com/csp/article/K03593314 - Third Party Advisory
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00037.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00037.html - Mailing List, Third Party Advisory

Information

Published : 2019-01-29 16:29

Updated : 2024-11-21 03:53


NVD link : CVE-2018-16880

Mitre link : CVE-2018-16880

CVE.ORG link : CVE-2018-16880


JSON object : View

Products Affected

canonical

  • ubuntu_linux

linux

  • linux_kernel
CWE
CWE-787

Out-of-bounds Write