CVE-2018-14775

tss_alloc in sys/arch/i386/i386/gdt.c in OpenBSD 6.2 and 6.3 has a Local Denial of Service (system crash) due to incorrect I/O port access control on the i386 architecture.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:openbsd:openbsd:6.2:*:*:*:*:*:*:*
cpe:2.3:o:openbsd:openbsd:6.3:*:*:*:*:*:*:*

History

21 Nov 2024, 03:49

Type Values Removed Values Added
References () http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/sys/arch/i386/i386/gdt.c - Issue Tracking, Patch, Vendor Advisory () http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/sys/arch/i386/i386/gdt.c - Issue Tracking, Patch, Vendor Advisory
References () http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/sys/arch/i386/i386/gdt.c.diff?r1=1.37&r2=1.37.8.1&f=h - Patch, Vendor Advisory () http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/sys/arch/i386/i386/gdt.c.diff?r1=1.37&r2=1.37.8.1&f=h - Patch, Vendor Advisory
References () http://www.securitytracker.com/id/1041550 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1041550 - Third Party Advisory, VDB Entry
References () https://ftp.openbsd.org/pub/OpenBSD/patches/6.2/common/020_ioport.patch.sig - Patch, Vendor Advisory () https://ftp.openbsd.org/pub/OpenBSD/patches/6.2/common/020_ioport.patch.sig - Patch, Vendor Advisory
References () https://ftp.openbsd.org/pub/OpenBSD/patches/6.3/common/015_ioport.patch.sig - Patch, Vendor Advisory () https://ftp.openbsd.org/pub/OpenBSD/patches/6.3/common/015_ioport.patch.sig - Patch, Vendor Advisory

Information

Published : 2018-08-01 06:29

Updated : 2024-11-21 03:49


NVD link : CVE-2018-14775

Mitre link : CVE-2018-14775

CVE.ORG link : CVE-2018-14775


JSON object : View

Products Affected

openbsd

  • openbsd
CWE
CWE-20

Improper Input Validation