CVE-2018-1000004

In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.
References
Link Resource
http://seclists.org/oss-sec/2018/q1/51 Exploit Mailing List Patch Third Party Advisory
http://www.securityfocus.com/bid/104606
https://access.redhat.com/errata/RHSA-2018:0654
https://access.redhat.com/errata/RHSA-2018:0676
https://access.redhat.com/errata/RHSA-2018:1062
https://access.redhat.com/errata/RHSA-2018:2390
https://access.redhat.com/errata/RHSA-2019:1483
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
https://usn.ubuntu.com/3631-1/
https://usn.ubuntu.com/3631-2/
https://usn.ubuntu.com/3798-1/
https://usn.ubuntu.com/3798-2/
https://www.debian.org/security/2018/dsa-4187
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
http://seclists.org/oss-sec/2018/q1/51 Exploit Mailing List Patch Third Party Advisory
http://www.securityfocus.com/bid/104606
https://access.redhat.com/errata/RHSA-2018:0654
https://access.redhat.com/errata/RHSA-2018:0676
https://access.redhat.com/errata/RHSA-2018:1062
https://access.redhat.com/errata/RHSA-2018:2390
https://access.redhat.com/errata/RHSA-2019:1483
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
https://usn.ubuntu.com/3631-1/
https://usn.ubuntu.com/3631-2/
https://usn.ubuntu.com/3798-1/
https://usn.ubuntu.com/3798-2/
https://www.debian.org/security/2018/dsa-4187
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.10:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.12:*:*:*:*:*:*:*

History

21 Nov 2024, 03:39

Type Values Removed Values Added
References () http://seclists.org/oss-sec/2018/q1/51 - Exploit, Mailing List, Patch, Third Party Advisory () http://seclists.org/oss-sec/2018/q1/51 - Exploit, Mailing List, Patch, Third Party Advisory
References () http://www.securityfocus.com/bid/104606 - () http://www.securityfocus.com/bid/104606 -
References () https://access.redhat.com/errata/RHSA-2018:0654 - () https://access.redhat.com/errata/RHSA-2018:0654 -
References () https://access.redhat.com/errata/RHSA-2018:0676 - () https://access.redhat.com/errata/RHSA-2018:0676 -
References () https://access.redhat.com/errata/RHSA-2018:1062 - () https://access.redhat.com/errata/RHSA-2018:1062 -
References () https://access.redhat.com/errata/RHSA-2018:2390 - () https://access.redhat.com/errata/RHSA-2018:2390 -
References () https://access.redhat.com/errata/RHSA-2019:1483 - () https://access.redhat.com/errata/RHSA-2019:1483 -
References () https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 - () https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 -
References () https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html - () https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html -
References () https://usn.ubuntu.com/3631-1/ - () https://usn.ubuntu.com/3631-1/ -
References () https://usn.ubuntu.com/3631-2/ - () https://usn.ubuntu.com/3631-2/ -
References () https://usn.ubuntu.com/3798-1/ - () https://usn.ubuntu.com/3798-1/ -
References () https://usn.ubuntu.com/3798-2/ - () https://usn.ubuntu.com/3798-2/ -
References () https://www.debian.org/security/2018/dsa-4187 - () https://www.debian.org/security/2018/dsa-4187 -
References () https://www.oracle.com/security-alerts/cpujul2020.html - () https://www.oracle.com/security-alerts/cpujul2020.html -
References () https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html - () https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -

Information

Published : 2018-01-16 20:29

Updated : 2024-11-21 03:39


NVD link : CVE-2018-1000004

Mitre link : CVE-2018-1000004

CVE.ORG link : CVE-2018-1000004


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')