Published on July 27th, 2019 📆 | 6997 Views ⚑
0Linux Kernel up to 4.19 phy-ocelot-serdes.c memory corruption
CVSS Meta Temp Score | Current Exploit Price (β) |
---|---|
5.3 | $5k-$25k |
A vulnerability, which was classified as critical, was found in Linux Kernel up to 4.19 (Operating System). This affects some unknown processing of the file drivers/phy/mscc/phy-ocelot-serdes.c. The manipulation with an unknown input leads to a memory corruption vulnerability (Out-of-Bounds). CWE is classifying the issue as CWE-119. This is going to have an impact on confidentiality, integrity, and availability.
The weakness was disclosed 07/26/2019 as confirmed git commit (GIT Repository). The advisory is shared at git.kernel.org. This vulnerability is uniquely identified as CVE-2018-20854 since 07/26/2019. Technical details are known, but no exploit is available. The price for an exploit might be around USD $5k-$25k at the moment (estimation calculated on 07/26/2019). The reason for this vulnerability is this part of code:
for (i = 0; i < = SERDES_MAX; i++) {
Upgrading to version 4.20 eliminates this vulnerability. Applying a patch is able to eliminate this problem. The bugfix is ready for download at github.com. The best possible mitigation is suggested to be upgrading to the latest version. The vulnerability will be addressed with the following lines of code:
for (i = 0; i < SERDES_MAX; i++) {
The entries 138839 and 138838 are pretty similar.
Type
Vendor
Name
VulDB Meta Base Score: 5.5
VulDB Meta Temp Score: 5.3
VulDB Base Score: β5.5
VulDB Temp Score: β5.3
VulDB Vector: π
VulDB Reliability: π
VulDB Base Score: π
VulDB Temp Score: π
VulDB Reliability: π
Class: Memory corruption / Out-of-Bounds (CWE-119)
Local: Yes
Remote: No
Availability: π
Status: Not defined
Price Prediction: π
Current Price Estimation: π
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Threat Intelligence
Threat: π
Adversaries: π
Geopolitics: π
Economy: π
Predictions: π
Remediation: πRecommended: Upgrade
Status: π
0-Day Time: π
Upgrade: Kernel 4.20
Patch: github.com
07/26/2019 Advisory disclosed
07/26/2019 VulDB entry created
07/26/2019 CVE assigned
07/26/2019 VulDB last updateVendor: kernel.org
Advisory: git.kernel.org
Status: Confirmed
CVE: CVE-2018-20854 (π)
See also: π
Created: 07/26/2019 02:40 PM
Complete: π
Download the whitepaper to learn more about our service!
https://vuldb.com/?id.138837
Gloss