Bugzilla – Full Text Bug Listing |
Summary: | VUL-0: CVE-2018-16885: kernel-source: kernel: out-of-bound read in memcpy_fromiovecend() | ||
---|---|---|---|
Product: | [Novell Products] SUSE Security Incidents | Reporter: | Marcus Meissner <meissner> |
Component: | Incidents | Assignee: | Michal Kubeček <mkubecek> |
Status: | RESOLVED INVALID | QA Contact: | Security Team bot <security-team> |
Severity: | Normal | ||
Priority: | P3 - Medium | CC: | bpetkov, bpoirier, mkubecek, smash_bz, tiwai |
Version: | unspecified | ||
Target Milestone: | --- | ||
Hardware: | Other | ||
OS: | Other | ||
URL: | https://smash.suse.de/issue/221531/ | ||
Whiteboard: | |||
Found By: | Security Response Team | Services Priority: | |
Business Priority: | Blocker: | --- | |
Marketing QA Status: | --- | IT Deployment: | --- |
Description
Marcus Meissner
2018-12-22 13:34:29 UTC
https://bugzilla.redhat.com/show_bug.cgi?id=1661503 (In reply to Nicholas Luedtke from comment #3) > Any more information on this? Fixing commit and/or introducing commit? Hello, Nicholas, I apologize for not mentioning previously that this is a RHEL-only bug. This specific bug is indirectly fixed upstream by UFO removal, and the buggy memcpy_fromiovecend() (and related functions) are fixed by: commit 21226abb4e9f14d88238964d89b279e461ddc30c Author: Al Viro <viro@zeniv.linux.org.uk> Date: Fri Nov 28 15:48:29 2014 -0500 net: switch memcpy_fromiovec()/memcpy_fromiovecend() users to copy_from_iter() would currently classify as not affected. |