Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-10902

Опубликовано: 21 авг. 2018
Источник: redhat
CVSS3: 7.8

Описание

It was found that the raw midi kernel driver does not protect against concurrent access which leads to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmidi.c file. A malicious local attacker could possibly use this for privilege escalation.

Отчет

This flaw affects all current shipping releases of Red Hat Enterprise Linux. This flaw requires real or emulated midi hardware available in the system. Fixes will be delivered when available.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5kernelWill not fix
Red Hat Enterprise Linux 8kernelNot affected
Red Hat Enterprise Linux 6kernelFixedRHSA-2019:041526.02.2019
Red Hat Enterprise Linux 7kernel-rtFixedRHSA-2018:309630.10.2018
Red Hat Enterprise Linux 7kernelFixedRHSA-2018:308330.10.2018
Red Hat Enterprise Linux 7kernel-altFixedRHSA-2019:321729.10.2019
Red Hat Enterprise Linux 7.5 Extended Update SupportkernelFixedRHSA-2019:396726.11.2019
Red Hat Enterprise MRG 2kernel-rtFixedRHSA-2019:064126.03.2019

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-416
https://bugzilla.redhat.com/show_bug.cgi?id=1590720kernel: MIDI driver race condition leads to a double-free

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 7 лет назад

It was found that the raw midi kernel driver does not protect against concurrent access which leads to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmidi.c file. A malicious local attacker could possibly use this for privilege escalation.

CVSS3: 7.8
nvd
почти 7 лет назад

It was found that the raw midi kernel driver does not protect against concurrent access which leads to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmidi.c file. A malicious local attacker could possibly use this for privilege escalation.

CVSS3: 7.8
debian
почти 7 лет назад

It was found that the raw midi kernel driver does not protect against ...

CVSS3: 7.8
github
около 3 лет назад

It was found that the raw midi kernel driver does not protect against concurrent access which leads to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmidi.c file. A malicious local attacker could possibly use this for privilege escalation.

oracle-oval
больше 6 лет назад

ELSA-2019-0415: kernel security and bug fix update (IMPORTANT)

7.8 High

CVSS3