Vulnerability Description
Memory leak in the irda_bind function in net/irda/af_irda.c and later in drivers/staging/irda/net/af_irda.c in the Linux kernel before 4.17 allows local users to cause a denial of service (memory consumption) by repeatedly binding an AF_IRDA socket.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | < 4.17 |
| Canonical | Ubuntu Linux | 12.04 |
| Debian | Debian Linux | 8.0 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/105302Third Party AdvisoryVDB Entry
- https://lists.debian.org/debian-lts-announce/2018/10/msg00003.htmlThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2019/03/msg00017.htmlMailing ListThird Party Advisory
- https://usn.ubuntu.com/3775-1/Third Party Advisory
- https://usn.ubuntu.com/3775-2/Third Party Advisory
- https://usn.ubuntu.com/3776-1/Third Party Advisory
- https://usn.ubuntu.com/3776-2/Third Party Advisory
- https://usn.ubuntu.com/3777-1/Third Party Advisory
- https://usn.ubuntu.com/3777-2/Third Party Advisory
- https://usn.ubuntu.com/3777-3/Third Party Advisory
- https://www.debian.org/security/2018/dsa-4308Third Party Advisory
- https://www.spinics.net/lists/stable/msg255030.htmlPatchThird Party Advisory
- https://www.spinics.net/lists/stable/msg255034.htmlPatchThird Party Advisory
- http://www.securityfocus.com/bid/105302Third Party AdvisoryVDB Entry
- https://lists.debian.org/debian-lts-announce/2018/10/msg00003.htmlThird Party Advisory
FAQ
What is CVE-2018-6554?
CVE-2018-6554 is a vulnerability with a CVSS score of 5.5 (MEDIUM). Memory leak in the irda_bind function in net/irda/af_irda.c and later in drivers/staging/irda/net/af_irda.c in the Linux kernel before 4.17 allows local users to cause a denial of service (memory cons...
How severe is CVE-2018-6554?
CVE-2018-6554 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-6554?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel, Canonical Ubuntu Linux, Debian Debian Linux.