Vulnerability Description
In the hidp_process_report in bluetooth, there is an integer overflow. This could lead to an out of bounds write with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-65853588 References: Upstream kernel.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Android | - | |
| Canonical | Ubuntu Linux | 12.04 |
| Debian | Debian Linux | 8.0 |
| Linux | Linux Kernel | >= 3.14, < 3.16.58 |
Related Weaknesses (CWE)
References
- https://access.redhat.com/errata/RHSA-2018:2948Third Party Advisory
- https://access.redhat.com/errata/RHSA-2019:2029Third Party Advisory
- https://access.redhat.com/errata/RHSA-2019:2043Third Party Advisory
- https://lists.debian.org/debian-lts-announce/2018/10/msg00003.htmlMailing ListThird Party Advisory
- https://source.android.com/security/bulletin/2018-06-01Vendor Advisory
- https://usn.ubuntu.com/3797-1/Third Party Advisory
- https://usn.ubuntu.com/3797-2/Third Party Advisory
- https://usn.ubuntu.com/3820-1/Third Party Advisory
- https://usn.ubuntu.com/3820-2/Third Party Advisory
- https://usn.ubuntu.com/3820-3/Third Party Advisory
- https://usn.ubuntu.com/3822-1/Third Party Advisory
- https://usn.ubuntu.com/3822-2/Third Party Advisory
- https://www.debian.org/security/2018/dsa-4308Third Party Advisory
- https://access.redhat.com/errata/RHSA-2018:2948Third Party Advisory
- https://access.redhat.com/errata/RHSA-2019:2029Third Party Advisory
FAQ
What is CVE-2018-9363?
CVE-2018-9363 is a vulnerability with a CVSS score of 8.4 (HIGH). In the hidp_process_report in bluetooth, there is an integer overflow. This could lead to an out of bounds write with no additional execution privileges needed. User interaction is not needed for expl...
How severe is CVE-2018-9363?
CVE-2018-9363 has been rated HIGH with a CVSS base score of 8.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-9363?
Check the references section above for vendor advisories and patch information. Affected products include: Google Android, Canonical Ubuntu Linux, Debian Debian Linux, Linux Linux Kernel.