CVE-2018-5814

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

In the Linux Kernel before version 4.16.11, 4.14.43, 4.9.102, and 4.4.133, multiple race condition errors when handling probe, disconnect, and rebind operations can be exploited to trigger a use-after-free condition or a NULL pointer dereference by sending multiple USB over IP packets.

References

http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00043.html

http://www.securitytracker.com/id/1041050

https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.43

https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.16.11

https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.133

https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.102

https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git/commit/?id=22076557b07c12086eeb16b8ce2b0b735f7a27e7

https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git/commit/?id=c171654caa875919be3c533d3518da8be5be966e

https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html

https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html

https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html

https://secuniaresearch.flexerasoftware.com/advisories/81540/

https://secuniaresearch.flexerasoftware.com/secunia_research/2018-8/

https://usn.ubuntu.com/3696-1/

https://usn.ubuntu.com/3696-2/

https://usn.ubuntu.com/3752-1/

https://usn.ubuntu.com/3752-2/

https://usn.ubuntu.com/3752-3/

Details

Source: MITRE

Published: 2018-06-12

Updated: 2019-05-20

Type: CWE-362

Risk Information

CVSS v2

Base Score: 6.9

Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C

Impact Score: 10

Exploitability Score: 3.4

Severity: MEDIUM

CVSS v3

Base Score: 7

Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

Impact Score: 5.9

Exploitability Score: 1

Severity: HIGH

Tenable Plugins

View all (12 total)

IDNameProductFamilySeverity
125303openSUSE Security Update : the Linux Kernel (openSUSE-2019-1407) (MDSUM/RIDL) (MFBDS/RIDL/ZombieLoad) (MLPDS/RIDL) (MSBDS/Fallout)NessusSuSE Local Security Checks
high
118283SUSE SLES12 Security Update : kernel (SUSE-SU-2018:2344-2) (Foreshadow)NessusSuSE Local Security Checks
high
112189Ubuntu 16.04 LTS / 18.04 LTS : Linux kernel (Azure, GCP, OEM) vulnerabilities (USN-3752-3)NessusUbuntu Local Security Checks
high
112110Ubuntu 16.04 LTS : Linux kernel (HWE) vulnerabilities (USN-3752-2)NessusUbuntu Local Security Checks
high
112109Ubuntu 18.04 LTS : Linux kernel vulnerabilities (USN-3752-1)NessusUbuntu Local Security Checks
high
111833SUSE SLES11 Security Update : kernel (SUSE-SU-2018:2366-1) (Foreshadow)NessusSuSE Local Security Checks
high
111815SUSE SLES12 Security Update : kernel (SUSE-SU-2018:2344-1) (Foreshadow)NessusSuSE Local Security Checks
high
111782SUSE SLES11 Security Update : kernel (SUSE-SU-2018:2332-1) (Foreshadow)NessusSuSE Local Security Checks
high
111165Debian DLA-1423-1 : linux-4.9 new package (Spectre)NessusDebian Local Security Checks
high
111082Debian DLA-1422-2 : linux security update (Spectre)NessusDebian Local Security Checks
high
110897Ubuntu 14.04 LTS : linux-lts-xenial, linux-aws vulnerabilities (USN-3696-2)NessusUbuntu Local Security Checks
high
110896Ubuntu 16.04 LTS : linux, linux-aws, linux-kvm, linux-raspi2, linux-snapdragon vulnerabilities (USN-3696-1)NessusUbuntu Local Security Checks
high