5.5
CVSSv3

CVE-2018-18710

Published: 29/10/2018 Updated: 03/04/2019
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 188
Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

An issue exists in the Linux kernel up to and including 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local malicious users to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

canonical ubuntu linux 12.04

canonical ubuntu linux 18.04

canonical ubuntu linux 16.04

canonical ubuntu linux 18.10

canonical ubuntu linux 14.04

debian debian linux 8.0

Vendor Advisories

A security flaw was found in the Linux kernel in a way that the cleancache subsystem clears an inode after the final file truncation (removal) The new file created with the same inode may contain leftover pages from cleancache and the old file data instead of the new one(CVE-2018-16862) An issue was discovered in the Linux kernel through 419 An ...
A security flaw was found in the Linux kernel in a way that the cleancache subsystem clears an inode after the final file truncation (removal) The new file created with the same inode may contain leftover pages from cleancache and the old file data instead of the new one(CVE-2018-16862) An issue was discovered in the Linux kernel through 419 An ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
An issue was discovered in the Linux kernel through 419 An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdromc could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking ...