CVE-2018-20961

critical
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

In the Linux kernel before 4.16.4, a double free vulnerability in the f_midi_set_alt function of drivers/usb/gadget/function/f_midi.c in the f_midi driver may allow attackers to cause a denial of service or possibly have unspecified other impact.

References

http://packetstormsecurity.com/files/154228/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html

http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html

https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.16.4

https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7fafcfdf6377b18b2a726ea554d6e593ba44349f

https://github.com/torvalds/linux/commit/7fafcfdf6377b18b2a726ea554d6e593ba44349f

https://seclists.org/bugtraq/2019/Aug/48

https://security.netapp.com/advisory/ntap-20190905-0002/

https://support.f5.com/csp/article/K58502654

https://support.f5.com/csp/article/K58502654?utm_source=f5support&utm_medium=RSS

https://usn.ubuntu.com/4145-1/

Details

Source: MITRE

Published: 2019-08-07

Updated: 2019-08-27

Type: CWE-415

Risk Information

CVSS v2

Base Score: 10

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Impact Score: 10

Exploitability Score: 10

Severity: HIGH

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Impact Score: 5.9

Exploitability Score: 3.9

Severity: CRITICAL

Vulnerable Software

Configuration 1

OR

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Tenable Plugins

View all (2 total)

IDNameProductFamilySeverity
129491Ubuntu 16.04 LTS : linux, linux-aws, linux-kvm, linux-raspi2, linux-snapdragon vulnerabilities (USN-4145-1)NessusUbuntu Local Security Checks
critical
128274Slackware 14.2 : Slackware 14.2 kernel (SSA:2019-238-01)NessusSlackware Local Security Checks
critical