Vulnerability Description
An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | <= 4.19 |
| Canonical | Ubuntu Linux | 12.04 |
| Debian | Debian Linux | 8.0 |
Related Weaknesses (CWE)
References
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e4f3aaPatchThird Party Advisory
- http://www.securityfocus.com/bid/106041Third Party AdvisoryVDB Entry
- https://github.com/torvalds/linux/commit/e4f3aa2e1e67bb48dfbaaf1cad59013d5a5bc27PatchThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2019/03/msg00017.htmlMailing ListThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2019/03/msg00034.htmlMailing ListThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2019/04/msg00004.htmlMailing ListThird Party Advisory
- https://usn.ubuntu.com/3846-1/Third Party Advisory
- https://usn.ubuntu.com/3847-1/Third Party Advisory
- https://usn.ubuntu.com/3847-2/Third Party Advisory
- https://usn.ubuntu.com/3847-3/Third Party Advisory
- https://usn.ubuntu.com/3848-1/Third Party Advisory
- https://usn.ubuntu.com/3848-2/Third Party Advisory
- https://usn.ubuntu.com/3849-1/Third Party Advisory
- https://usn.ubuntu.com/3849-2/Third Party Advisory
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e4f3aaPatchThird Party Advisory
FAQ
What is CVE-2018-18710?
CVE-2018-18710 is a vulnerability with a CVSS score of 5.5 (MEDIUM). An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast ...
How severe is CVE-2018-18710?
CVE-2018-18710 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-18710?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel, Canonical Ubuntu Linux, Debian Debian Linux.