First published: Fri Aug 31 2018(Updated: )
An issue was discovered in yurex_read in drivers/usb/misc/yurex.c in the Linux kernel before 4.17.7. Local attackers could use user access read/writes with incorrect bounds checking in the yurex USB driver to crash the kernel or potentially escalate privileges.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=2.6.37<3.16.58 | |
Linux Kernel | >=3.17<3.18.116 | |
Linux Kernel | >=3.19<4.4.141 | |
Linux Kernel | >=4.5<4.9.113 | |
Linux Kernel | >=4.10<4.14.56 | |
Linux Kernel | >=4.15<4.17.7 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =18.04 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.119-1 6.12.10-1 6.12.11-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-16276 is categorized as a high severity vulnerability due to the potential for local privilege escalation and kernel crashes.
To fix CVE-2018-16276, upgrade your Linux kernel to version 4.17.7 or later.
CVE-2018-16276 affects Linux kernel versions before 4.17.7, including various versions in the 2.6, 3.x, and 4.x series.
CVE-2018-16276 requires local access to exploit, making it a local attack vector rather than a remote one.
The impacts of CVE-2018-16276 include potential kernel crashes and unauthorized privilege escalation for local attackers.