Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2018-11508 — Sensitive Information Exposure in Kernel
Severity
5.5MEDIUMNVD
EPSS
1.5%
top 18.62%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedMay 28
Latest updateOct 7
Description
The compat_get_timex function in kernel/compat.c in the Linux kernel before 4.16.9 allows local users to obtain sensitive information from kernel memory via adjtimex.
CVSS vector
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:NExploitability: 1.8 | Impact: 3.6
Affected Packages4 packages
Also affects: Ubuntu Linux 16.04, 17.10, 18.04
Patches
🔴Vulnerability Details
7OSV▶
linux, linux-aws, linux-azure, linux-gcp, linux-kvm, linux-oem, linux-raspi2 vulnerabilities↗2018-07-02
💥Exploits & PoCs
1📋Vendor Advisories
8📄Research Papers
1💬Community
2Bugzilla▶
CVE-2018-11508 kernel: Missing initialization in kernel/compat.c:compat_get_timex() allows local attacker to obtain possibly sensitive information via adjtimex [fedora-all]↗2018-05-28
Bugzilla▶
CVE-2018-11508 kernel: Missing initialization in kernel/compat.c:compat_get_timex() allows local attacker to obtain possibly sensitive information via adjtimex↗2018-05-28