CVE-2018-10124

The kill_something_info function in kernel/signal.c in the Linux kernel before 4.13, when an unspecified architecture and compiler is used, might allow local users to cause a denial of service via an INT_MIN argument.
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*

History

21 Nov 2024, 03:40

Type Values Removed Values Added
References () http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4ea77014af0d6205b05503d1c7aac6eace11d473 - Patch, Vendor Advisory () http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4ea77014af0d6205b05503d1c7aac6eace11d473 - Patch, Vendor Advisory
References () http://www.securitytracker.com/id/1040684 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1040684 - Third Party Advisory, VDB Entry
References () https://github.com/torvalds/linux/commit/4ea77014af0d6205b05503d1c7aac6eace11d473 - Patch, Third Party Advisory () https://github.com/torvalds/linux/commit/4ea77014af0d6205b05503d1c7aac6eace11d473 - Patch, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html - Mailing List, Third Party Advisory
References () https://news.ycombinator.com/item?id=2972021 - Exploit, Third Party Advisory () https://news.ycombinator.com/item?id=2972021 - Exploit, Third Party Advisory
References () https://usn.ubuntu.com/3696-1/ - Third Party Advisory () https://usn.ubuntu.com/3696-1/ - Third Party Advisory
References () https://usn.ubuntu.com/3696-2/ - Third Party Advisory () https://usn.ubuntu.com/3696-2/ - Third Party Advisory
References () https://usn.ubuntu.com/3754-1/ - Third Party Advisory () https://usn.ubuntu.com/3754-1/ - Third Party Advisory

Information

Published : 2018-04-16 14:29

Updated : 2024-11-21 03:40


NVD link : CVE-2018-10124

Mitre link : CVE-2018-10124

CVE.ORG link : CVE-2018-10124


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel

canonical

  • ubuntu_linux
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer