{"id":"CVE-2018-7566","details":"The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user.","modified":"2026-04-02T01:23:39.541921Z","published":"2018-03-30T21:29:02.010Z","related":["SUSE-SU-2018:0834-1","SUSE-SU-2018:0848-1","SUSE-SU-2018:0988-1","SUSE-SU-2018:0989-1","SUSE-SU-2018:0990-1","SUSE-SU-2018:0991-1","SUSE-SU-2018:0992-1","SUSE-SU-2018:0993-1","SUSE-SU-2018:0994-1","SUSE-SU-2018:0995-1","SUSE-SU-2018:0996-1","SUSE-SU-2018:0997-1","SUSE-SU-2018:0998-1","SUSE-SU-2018:0999-1","SUSE-SU-2018:1000-1","SUSE-SU-2018:1001-1","SUSE-SU-2018:1002-1","SUSE-SU-2018:1003-1","SUSE-SU-2018:1004-1","SUSE-SU-2018:1005-1","SUSE-SU-2018:1006-1","SUSE-SU-2018:1007-1","SUSE-SU-2018:1008-1","SUSE-SU-2018:1009-1","SUSE-SU-2018:1010-1","SUSE-SU-2018:1011-1","SUSE-SU-2018:1012-1","SUSE-SU-2018:1013-1","SUSE-SU-2018:1014-1","SUSE-SU-2018:1015-1","SUSE-SU-2018:1016-1","SUSE-SU-2018:1018-1","SUSE-SU-2018:1019-1","SUSE-SU-2018:1020-1","SUSE-SU-2018:1021-1","SUSE-SU-2018:1022-1","SUSE-SU-2018:1023-1","SUSE-SU-2018:1024-1","SUSE-SU-2018:1025-1","SUSE-SU-2018:1026-1","SUSE-SU-2018:1027-1","SUSE-SU-2018:1028-1","SUSE-SU-2018:1029-1","SUSE-SU-2018:1030-1","SUSE-SU-2018:1031-1","SUSE-SU-2018:1032-1","SUSE-SU-2018:1033-1","SUSE-SU-2018:1034-1","SUSE-SU-2018:1035-1","SUSE-SU-2018:1080-1","SUSE-SU-2018:1172-1","SUSE-SU-2018:1309-1"],"references":[{"type":"WEB","url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3631-1/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2018/dsa-4188"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2018-03/msg00067.html"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:2384"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:2948"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3798-2/"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:1487"},{"type":"ADVISORY","url":"https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3631-2/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3798-1/"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/103605"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:2390"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:2395"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:1483"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html"},{"type":"ADVISORY","url":"https://www.debian.org/security/2018/dsa-4187"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1550142"},{"type":"FIX","url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"},{"type":"FIX","url":"http://mailman.alsa-project.org/pipermail/alsa-devel/2018-February/132026.html"},{"type":"FIX","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d15d662e89fc667b90cd294b0eb45694e33144da"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git","events":[{"introduced":"0"},{"last_affected":"d8a5b80568a9cb66810e75b182018e9edb68e8ff"},{"introduced":"0"},{"last_affected":"4fe89d07dcc2804c8b562f6c7896a45643d34b2f"},{"introduced":"0"},{"last_affected":"4fe89d07dcc2804c8b562f6c7896a45643d34b2f"},{"introduced":"0"},{"last_affected":"4fe89d07dcc2804c8b562f6c7896a45643d34b2f"},{"fixed":"d15d662e89fc667b90cd294b0eb45694e33144da"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"4.15"},{"introduced":"0"},{"last_affected":"6.0"},{"introduced":"0"},{"last_affected":"6.0"},{"introduced":"0"},{"last_affected":"6.0"}]}}],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"12"}]},{"events":[{"introduced":"0"},{"last_affected":"12"}]},{"events":[{"introduced":"0"},{"last_affected":"12.04"}]},{"events":[{"introduced":"0"},{"last_affected":"14.04"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.6"}]},{"events":[{"introduced":"0"},{"last_affected":"7.5"}]},{"events":[{"introduced":"0"},{"last_affected":"7.6"}]},{"events":[{"introduced":"0"},{"last_affected":"7.6"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"16.1.0"}]},{"events":[{"introduced":"0"},{"last_affected":"16.2.0"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-7566.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}