Vulnerability Description
An integer overflow in the implementation of the posix_memalign in memalign functions in the GNU C Library (aka glibc or libc6) 2.26 and earlier could cause these functions to return a pointer to a heap area that is too small, potentially leading to heap corruption.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gnu | Glibc | <= 2.26 |
| Redhat | Virtualization Host | 4.0 |
| Redhat | Enterprise Linux Desktop | 7.0 |
| Redhat | Enterprise Linux Server | 7.0 |
| Redhat | Enterprise Linux Workstation | 7.0 |
| Oracle | Communications Session Border Controller | 8.0.0 |
| Oracle | Enterprise Communications Broker | 3.0.0 |
| Netapp | Cloud Backup | - |
| Netapp | Data Ontap Edge | - |
| Netapp | Element Software | - |
| Netapp | Element Software Management | - |
| Netapp | Steelstore Cloud Integrated Storage | - |
| Netapp | Storage Replication Adapter | >= 7.2 |
| Netapp | Vasa Provider | >= 7.2 |
| Netapp | Virtual Storage Console | >= 7.2 |
Related Weaknesses (CWE)
References
- http://bugs.debian.org/878159Issue TrackingMailing ListThird Party Advisory
- http://www.securityfocus.com/bid/102912Third Party AdvisoryVDB Entry
- https://access.redhat.com/errata/RHBA-2019:0327Third Party Advisory
- https://access.redhat.com/errata/RHSA-2018:3092PatchThird Party Advisory
- https://security.netapp.com/advisory/ntap-20190404-0003/Third Party Advisory
- https://sourceware.org/bugzilla/show_bug.cgi?id=22343Issue TrackingThird Party Advisory
- https://usn.ubuntu.com/4218-1/
- https://usn.ubuntu.com/4416-1/
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.htmlPatchThird Party Advisory
- http://bugs.debian.org/878159Issue TrackingMailing ListThird Party Advisory
- http://www.securityfocus.com/bid/102912Third Party AdvisoryVDB Entry
- https://access.redhat.com/errata/RHBA-2019:0327Third Party Advisory
- https://access.redhat.com/errata/RHSA-2018:3092PatchThird Party Advisory
- https://security.netapp.com/advisory/ntap-20190404-0003/Third Party Advisory
- https://sourceware.org/bugzilla/show_bug.cgi?id=22343Issue TrackingThird Party Advisory
FAQ
What is CVE-2018-6485?
CVE-2018-6485 is a vulnerability with a CVSS score of 9.8 (CRITICAL). An integer overflow in the implementation of the posix_memalign in memalign functions in the GNU C Library (aka glibc or libc6) 2.26 and earlier could cause these functions to return a pointer to a he...
How severe is CVE-2018-6485?
CVE-2018-6485 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2018-6485?
Check the references section above for vendor advisories and patch information. Affected products include: Gnu Glibc, Redhat Virtualization Host, Redhat Enterprise Linux Desktop, Redhat Enterprise Linux Server, Redhat Enterprise Linux Workstation.