Bugzilla – Bug 1120258
VUL-0: CVE-2018-16885: kernel-source: kernel: out-of-bound read in memcpy_fromiovecend()
Last modified: 2024-07-04 09:14:53 UTC
rh#1661503 A flaw was found in the Linux kernel that allows the userspace to call memcpy_fromiovecend() and similar functions with a zero offset and buffer length which causes the read beyond the buffer boundaries, in certain cases causing a memory access fault and a system halt by accessing invalid memory address. References: https://bugzilla.redhat.com/show_bug.cgi?id=1661503 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-16885
https://bugzilla.redhat.com/show_bug.cgi?id=1661503 (In reply to Nicholas Luedtke from comment #3) > Any more information on this? Fixing commit and/or introducing commit? Hello, Nicholas, I apologize for not mentioning previously that this is a RHEL-only bug. This specific bug is indirectly fixed upstream by UFO removal, and the buggy memcpy_fromiovecend() (and related functions) are fixed by: commit 21226abb4e9f14d88238964d89b279e461ddc30c Author: Al Viro <viro@zeniv.linux.org.uk> Date: Fri Nov 28 15:48:29 2014 -0500 net: switch memcpy_fromiovec()/memcpy_fromiovecend() users to copy_from_iter()
would currently classify as not affected.