CVE-2018-10902

It was found that the raw midi kernel driver does not protect against concurrent access which leads to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmidi.c file. A malicious local attacker could possibly use this for privilege escalation.
References
Link Resource
http://www.securityfocus.com/bid/105119 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1041529 Patch Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2018:3083 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3096 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:0415 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:0641 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:3217
https://access.redhat.com/errata/RHSA-2019:3967
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10902 Issue Tracking Patch Third Party Advisory
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=39675f7a7c7e7702f7d5341f1e0d01db746543a0 Patch Vendor Advisory
https://lists.debian.org/debian-lts-announce/2018/10/msg00003.html Mailing List Third Party Advisory
https://usn.ubuntu.com/3776-1/ Third Party Advisory
https://usn.ubuntu.com/3776-2/ Third Party Advisory
https://usn.ubuntu.com/3847-1/ Third Party Advisory
https://usn.ubuntu.com/3847-2/ Third Party Advisory
https://usn.ubuntu.com/3847-3/ Third Party Advisory
https://usn.ubuntu.com/3849-1/ Third Party Advisory
https://usn.ubuntu.com/3849-2/ Third Party Advisory
https://www.debian.org/security/2018/dsa-4308 Third Party Advisory
http://www.securityfocus.com/bid/105119 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1041529 Patch Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2018:3083 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3096 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:0415 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:0641 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:3217
https://access.redhat.com/errata/RHSA-2019:3967
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10902 Issue Tracking Patch Third Party Advisory
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=39675f7a7c7e7702f7d5341f1e0d01db746543a0 Patch Vendor Advisory
https://lists.debian.org/debian-lts-announce/2018/10/msg00003.html Mailing List Third Party Advisory
https://usn.ubuntu.com/3776-1/ Third Party Advisory
https://usn.ubuntu.com/3776-2/ Third Party Advisory
https://usn.ubuntu.com/3847-1/ Third Party Advisory
https://usn.ubuntu.com/3847-2/ Third Party Advisory
https://usn.ubuntu.com/3847-3/ Third Party Advisory
https://usn.ubuntu.com/3849-1/ Third Party Advisory
https://usn.ubuntu.com/3849-2/ Third Party Advisory
https://www.debian.org/security/2018/dsa-4308 Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*

Configuration 3 (hide)

cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

History

21 Nov 2024, 03:42

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/105119 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/105119 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1041529 - Patch, Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1041529 - Patch, Third Party Advisory, VDB Entry
References () https://access.redhat.com/errata/RHSA-2018:3083 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:3083 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:3096 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:3096 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2019:0415 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2019:0415 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2019:0641 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2019:0641 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2019:3217 - () https://access.redhat.com/errata/RHSA-2019:3217 -
References () https://access.redhat.com/errata/RHSA-2019:3967 - () https://access.redhat.com/errata/RHSA-2019:3967 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10902 - Issue Tracking, Patch, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10902 - Issue Tracking, Patch, Third Party Advisory
References () https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=39675f7a7c7e7702f7d5341f1e0d01db746543a0 - Patch, Vendor Advisory () https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=39675f7a7c7e7702f7d5341f1e0d01db746543a0 - Patch, Vendor Advisory
References () https://lists.debian.org/debian-lts-announce/2018/10/msg00003.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2018/10/msg00003.html - Mailing List, Third Party Advisory
References () https://usn.ubuntu.com/3776-1/ - Third Party Advisory () https://usn.ubuntu.com/3776-1/ - Third Party Advisory
References () https://usn.ubuntu.com/3776-2/ - Third Party Advisory () https://usn.ubuntu.com/3776-2/ - Third Party Advisory
References () https://usn.ubuntu.com/3847-1/ - Third Party Advisory () https://usn.ubuntu.com/3847-1/ - Third Party Advisory
References () https://usn.ubuntu.com/3847-2/ - Third Party Advisory () https://usn.ubuntu.com/3847-2/ - Third Party Advisory
References () https://usn.ubuntu.com/3847-3/ - Third Party Advisory () https://usn.ubuntu.com/3847-3/ - Third Party Advisory
References () https://usn.ubuntu.com/3849-1/ - Third Party Advisory () https://usn.ubuntu.com/3849-1/ - Third Party Advisory
References () https://usn.ubuntu.com/3849-2/ - Third Party Advisory () https://usn.ubuntu.com/3849-2/ - Third Party Advisory
References () https://www.debian.org/security/2018/dsa-4308 - Third Party Advisory () https://www.debian.org/security/2018/dsa-4308 - Third Party Advisory

Information

Published : 2018-08-21 19:29

Updated : 2024-11-21 03:42


NVD link : CVE-2018-10902

Mitre link : CVE-2018-10902

CVE.ORG link : CVE-2018-10902


JSON object : View

Products Affected

linux

  • linux_kernel

canonical

  • ubuntu_linux

redhat

  • enterprise_linux_desktop
  • enterprise_linux_workstation
  • enterprise_linux_server

debian

  • debian_linux
CWE
CWE-416

Use After Free

CWE-415

Double Free