CVE-2018-9363

In the hidp_process_report in bluetooth, there is an integer overflow. This could lead to an out of bounds write with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-65853588 References: Upstream kernel.
References
Link Resource
https://access.redhat.com/errata/RHSA-2018:2948 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:2029 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:2043 Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/10/msg00003.html Mailing List Third Party Advisory
https://source.android.com/security/bulletin/2018-06-01 Vendor Advisory
https://usn.ubuntu.com/3797-1/ Third Party Advisory
https://usn.ubuntu.com/3797-2/ Third Party Advisory
https://usn.ubuntu.com/3820-1/ Third Party Advisory
https://usn.ubuntu.com/3820-2/ Third Party Advisory
https://usn.ubuntu.com/3820-3/ Third Party Advisory
https://usn.ubuntu.com/3822-1/ Third Party Advisory
https://usn.ubuntu.com/3822-2/ Third Party Advisory
https://www.debian.org/security/2018/dsa-4308 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2948 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:2029 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:2043 Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/10/msg00003.html Mailing List Third Party Advisory
https://source.android.com/security/bulletin/2018-06-01 Vendor Advisory
https://usn.ubuntu.com/3797-1/ Third Party Advisory
https://usn.ubuntu.com/3797-2/ Third Party Advisory
https://usn.ubuntu.com/3820-1/ Third Party Advisory
https://usn.ubuntu.com/3820-2/ Third Party Advisory
https://usn.ubuntu.com/3820-3/ Third Party Advisory
https://usn.ubuntu.com/3822-1/ Third Party Advisory
https://usn.ubuntu.com/3822-2/ Third Party Advisory
https://www.debian.org/security/2018/dsa-4308 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:o:google:android:-:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:15

Type Values Removed Values Added
References () https://access.redhat.com/errata/RHSA-2018:2948 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:2948 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2019:2029 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2019:2029 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2019:2043 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2019:2043 - Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2018/10/msg00003.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2018/10/msg00003.html - Mailing List, Third Party Advisory
References () https://source.android.com/security/bulletin/2018-06-01 - Vendor Advisory () https://source.android.com/security/bulletin/2018-06-01 - Vendor Advisory
References () https://usn.ubuntu.com/3797-1/ - Third Party Advisory () https://usn.ubuntu.com/3797-1/ - Third Party Advisory
References () https://usn.ubuntu.com/3797-2/ - Third Party Advisory () https://usn.ubuntu.com/3797-2/ - Third Party Advisory
References () https://usn.ubuntu.com/3820-1/ - Third Party Advisory () https://usn.ubuntu.com/3820-1/ - Third Party Advisory
References () https://usn.ubuntu.com/3820-2/ - Third Party Advisory () https://usn.ubuntu.com/3820-2/ - Third Party Advisory
References () https://usn.ubuntu.com/3820-3/ - Third Party Advisory () https://usn.ubuntu.com/3820-3/ - Third Party Advisory
References () https://usn.ubuntu.com/3822-1/ - Third Party Advisory () https://usn.ubuntu.com/3822-1/ - Third Party Advisory
References () https://usn.ubuntu.com/3822-2/ - Third Party Advisory () https://usn.ubuntu.com/3822-2/ - Third Party Advisory
References () https://www.debian.org/security/2018/dsa-4308 - Third Party Advisory () https://www.debian.org/security/2018/dsa-4308 - Third Party Advisory

Information

Published : 2018-11-06 17:29

Updated : 2024-11-21 04:15


NVD link : CVE-2018-9363

Mitre link : CVE-2018-9363

CVE.ORG link : CVE-2018-9363


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel

google

  • android

canonical

  • ubuntu_linux
CWE
CWE-190

Integer Overflow or Wraparound

CWE-787

Out-of-bounds Write