First published: Fri Dec 21 2018(Updated: )
A flaw was found in the Linux kernel that allows the userspace to call memcpy_fromiovecend() and similar functions with a zero offset and buffer length which causes the read beyond the buffer boundaries, in certain cases causing a memory access fault and a system halt by accessing invalid memory address. Note: this is a RHEL-only bug.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Linux |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1661503 is considered high as it can lead to memory access faults and system halts.
To fix REDHAT-BUG-1661503, ensure you update to the latest patched version of the Red Hat Linux kernel.
REDHAT-BUG-1661503 can cause a read beyond buffer boundaries, potentially leading to system crashes.
REDHAT-BUG-1661503 affects specific versions of the Red Hat Linux kernel where the vulnerability exists.
Currently, there is no widely recommended workaround for REDHAT-BUG-1661503, so applying the patch is advised.