CVE-2018-8754

Publication date 18 March 2018

Last updated 4 August 2025


Ubuntu priority

Cvss 3 Severity Score

5.5 · Medium

Score breakdown

Description

The libevt_record_values_read_event() function in libevt_record_values.c in libevt before 2018-03-17 does not properly check for out-of-bounds values of user SID data size, strings size, or data size. NOTE: the vendor has disputed this as described in libyal/libevt issue 5 on GitHub

Status

Package Ubuntu Release Status
libevt 24.04 LTS noble
Fixed 20170120-2
23.10 mantic
Fixed 20170120-2
23.04 lunar
Fixed 20170120-2
22.10 kinetic
Fixed 20170120-2
22.04 LTS jammy
Fixed 20170120-2
21.10 impish
Fixed 20170120-2
21.04 hirsute
Fixed 20170120-2
20.10 groovy
Fixed 20170120-2
20.04 LTS focal
Fixed 20170120-2
19.10 eoan
Fixed 20170120-2
19.04 disco
Fixed 20170120-2
18.10 cosmic
Fixed 20170120-2
18.04 LTS bionic
Fixed 20170120-2
17.10 artful
Fixed 20170120-1+deb9u1build0.17.10.1
16.04 LTS xenial
Not affected
14.04 LTS trusty Not in release

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
libevt

Severity score breakdown

Parameter Value
Base score 5.5 · Medium
Attack vector Local
Attack complexity Low
Privileges required Low
User interaction None
Scope Unchanged
Confidentiality None
Integrity impact None
Availability impact High
Vector CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H