Vulnerability Name: | CVE-2018-9384 (CCN-241802) | ||||||
Assigned: | 2018-04-05 | ||||||
Published: | 2019-06-16 | ||||||
Updated: | 2019-06-16 | ||||||
Summary: | Linux Kernel could allow a local attacker to obtain sensitive information, caused by stack-based buffer overflow in thread_info. By sending a specially-crafted request, an attacker could exploit this vulnerability to obtain sensitive information, and use this information to launch further attacks against the affected system. | ||||||
CVSS v3 Severity: | 6.2 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) 5.4 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
| ||||||
CVSS v2 Severity: | 4.9 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:N/A:N)
| ||||||
Vulnerability Consequences: | Obtain Information | ||||||
References: | Source: MITRE Type: CNA CVE-2018-9384 Source: XF Type: UNKNOWN linux-kernel-cve20189384-info-disc(241802) Source: CCN Type: Linux Kernel GIT Repository arm64: split thread_info from task stack Source: CCN Type: Mend Vulnerability Database CVE-2018-9384 | ||||||
Vulnerable Configuration: | Configuration CCN 1: Denotes that component is vulnerable | ||||||
BACK |