7.8
CVSSv3

CVE-2018-20669

Published: 21/03/2019 Updated: 11/04/2023
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 641
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

An issue where a provided address with access_ok() is not checked exists in i915_gem_execbuffer2_ioctl in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Linux kernel up to and including 4.19.13. A local attacker can craft a malicious IOCTL function call to overwrite arbitrary kernel memory, resulting in a Denial of Service or privilege escalation.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

canonical ubuntu linux 18.04

canonical ubuntu linux 14.04

canonical ubuntu linux 16.04

netapp solidfire -

netapp hci management node -

netapp snapprotect -

netapp cn1610_firmware -

Vendor Advisories

Debian Bug report logs - #962254 NFSv42: umask not applied on filesystem without ACL support Package: src:linux; Maintainer for src:linux is Debian Kernel Team <debian-kernel@listsdebianorg>; Reported by: Elliott Mitchell <ehem+debian@m5pcom> Date: Fri, 5 Jun 2020 05:42:01 UTC Severity: grave Tags: security, ups ...
An issue where a provided address with access_ok() is not checked was discovered in i915_gem_execbuffer2_ioctl in drivers/gpu/drm/i915/i915_gem_execbufferc in the Linux kernel through 41913 A local attacker can craft a malicious IOCTL function call to overwrite arbitrary kernel memory, resulting in a Denial of Service or privilege escalation ( ...
An issue where a provided address with access_ok() is not checked was discovered in i915_gem_execbuffer2_ioctl in drivers/gpu/drm/i915/i915_gem_execbufferc in the Linux kernel through 41913 A local attacker can craft a malicious IOCTL function call to overwrite arbitrary kernel memory, resulting in a Denial of Service or privilege escalation ( ...
Impact: Important Public Date: 2019-01-04 CWE: CWE-358->CWE-391 Bugzilla: 1669141: CVE-2018-20669 ke ...

Recent Articles

Too bad, so sad, exploit devs: Google patches possibly several million dollars' worth of security flaws in Android
The Register • Shaun Nichols in San Francisco • 05 Sep 2019

Except one – a 'your phone is now my phone' bug reported months ago and still not fixed Fancy buying a compact and bijou cardboard box home in a San Francisco alley? This $2.5m Android bounty will get you nearly there

Google this week emitted the September edition of its monthly Android security updates – and has left at least one known vulnerability unpatched. Also, in case you missed it, the web giant started rolling out Android 10 a few days ago. The September 2019 bundle of security fixes will be pushed out automatically to Google-branded devices, while those with other Android gear will be fed the fixes by their device manufacturer or mobile carrier. Some of the holes can be patched remotely by the ad ...