CVE-2018-16885

A flaw was found in the Linux kernel that allows the userspace to call memcpy_fromiovecend() and similar functions with a zero offset and buffer length which causes the read beyond the buffer boundaries, in certain cases causing a memory access fault and a system halt by accessing invalid memory address. This issue only affects kernel version 3.10.x as shipped with Red Hat Enterprise Linux 7.
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*

History

21 Nov 2024, 03:53

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/106296 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/106296 - Third Party Advisory, VDB Entry
References () https://access.redhat.com/errata/RHSA-2019:2029 - () https://access.redhat.com/errata/RHSA-2019:2029 -
References () https://access.redhat.com/errata/RHSA-2019:2043 - () https://access.redhat.com/errata/RHSA-2019:2043 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16885 - Issue Tracking, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16885 - Issue Tracking, Third Party Advisory
CVSS v2 : 4.9
v3 : 5.5
v2 : 4.9
v3 : 4.7

Information

Published : 2019-01-03 16:29

Updated : 2024-11-21 03:53


NVD link : CVE-2018-16885

Mitre link : CVE-2018-16885

CVE.ORG link : CVE-2018-16885


JSON object : View

Products Affected

linux

  • linux_kernel

redhat

  • enterprise_linux_server
CWE
CWE-125

Out-of-bounds Read