vulnerability
SUSE: CVE-2018-12896: SUSE Linux Security Advisory
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
2 | (AV:L/AC:L/Au:N/C:N/I:N/A:P) | Jul 2, 2018 | Sep 17, 2018 | Feb 4, 2022 |
Severity
2
CVSS
(AV:L/AC:L/Au:N/C:N/I:N/A:P)
Published
Jul 2, 2018
Added
Sep 17, 2018
Modified
Feb 4, 2022
Description
An issue was discovered in the Linux kernel through 4.17.3. An Integer Overflow in kernel/time/posix-timers.c in the POSIX timer code is caused by the way the overrun accounting works. Depending on interval and expiry time values, the overrun can be larger than INT_MAX, but the accounting is int based. This basically makes the accounting values, which are visible to user space via timer_getoverrun(2) and siginfo::si_overrun, random. For example, a local user can cause a denial of service (signed integer overflow) via crafted mmap, futex, timer_create, and timer_settime system calls.
Solution(s)
suse-upgrade-kernel-azure-basesuse-upgrade-kernel-defaultsuse-upgrade-kernel-default-extrasuse-upgrade-kernel-default-mansuse-upgrade-kernel-devel-azuresuse-upgrade-kernel-docssuse-upgrade-kernel-docs-azuresuse-upgrade-kernel-obs-buildsuse-upgrade-kernel-source-azure
References
- SUSE-SUSE-SU-2018:2775-1
- SUSE-SUSE-SU-2018:2776-1
- SUSE-SUSE-SU-2018:2858-1
- SUSE-SUSE-SU-2018:2862-1
- SUSE-SUSE-SU-2018:2879-1
- SUSE-SUSE-SU-2018:2908-1
- SUSE-SUSE-SU-2018:2908-2
- SUSE-SUSE-SU-2018:2980-1
- SUSE-SUSE-SU-2018:2981-1
- SUSE-SUSE-SU-2018:3083-1
- SUSE-SUSE-SU-2018:3084-1
- SUSE-SUSE-SU-2018:3088-1
- SUSE-SUSE-SU-2018:3618-1
- SUSE-SUSE-SU-2018:3961-1
- UBUNTU-USN-3847-1
- UBUNTU-USN-3847-2
- UBUNTU-USN-3847-3
- UBUNTU-USN-3848-1
- UBUNTU-USN-3848-2
- UBUNTU-USN-3849-1
- UBUNTU-USN-3849-2
- NVD-CVE-2018-12896

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.