vulnerability
Ubuntu: (Multiple Advisories) (CVE-2018-10902): Linux kernel vulnerabilities
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
5 | (AV:L/AC:L/Au:N/C:P/I:P/A:P) | Aug 21, 2018 | Oct 5, 2018 | Jan 23, 2025 |
Severity
5
CVSS
(AV:L/AC:L/Au:N/C:P/I:P/A:P)
Published
Aug 21, 2018
Added
Oct 5, 2018
Modified
Jan 23, 2025
Description
It was found that the raw midi kernel driver does not protect against concurrent access which leads to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmidi.c file. A malicious local attacker could possibly use this for privilege escalation.
Solution(s)
ubuntu-upgrade-linux-image-3-13-0-164-genericubuntu-upgrade-linux-image-3-13-0-164-generic-lpaeubuntu-upgrade-linux-image-3-13-0-164-lowlatencyubuntu-upgrade-linux-image-3-13-0-164-powerpc-e500ubuntu-upgrade-linux-image-3-13-0-164-powerpc-e500mcubuntu-upgrade-linux-image-3-13-0-164-powerpc-smpubuntu-upgrade-linux-image-3-13-0-164-powerpc64-embubuntu-upgrade-linux-image-3-13-0-164-powerpc64-smpubuntu-upgrade-linux-image-4-15-0-1026-gcpubuntu-upgrade-linux-image-4-15-0-1028-kvmubuntu-upgrade-linux-image-4-15-0-1030-oemubuntu-upgrade-linux-image-4-15-0-1030-raspi2ubuntu-upgrade-linux-image-4-15-0-1031-awsubuntu-upgrade-linux-image-4-15-0-1036-azureubuntu-upgrade-linux-image-4-15-0-43-genericubuntu-upgrade-linux-image-4-15-0-43-generic-lpaeubuntu-upgrade-linux-image-4-15-0-43-lowlatencyubuntu-upgrade-linux-image-4-15-0-43-snapdragonubuntu-upgrade-linux-image-4-4-0-1031-awsubuntu-upgrade-linux-image-4-4-0-1035-kvmubuntu-upgrade-linux-image-4-4-0-1069-awsubuntu-upgrade-linux-image-4-4-0-1098-raspi2ubuntu-upgrade-linux-image-4-4-0-1102-snapdragonubuntu-upgrade-linux-image-4-4-0-137-genericubuntu-upgrade-linux-image-4-4-0-137-generic-lpaeubuntu-upgrade-linux-image-4-4-0-137-lowlatencyubuntu-upgrade-linux-image-4-4-0-137-powerpc-e500mcubuntu-upgrade-linux-image-4-4-0-137-powerpc-smpubuntu-upgrade-linux-image-4-4-0-137-powerpc64-embubuntu-upgrade-linux-image-4-4-0-137-powerpc64-smpubuntu-upgrade-linux-image-awsubuntu-upgrade-linux-image-aws-hweubuntu-upgrade-linux-image-azureubuntu-upgrade-linux-image-gcpubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-hwe-16-04ubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-generic-lpae-hwe-16-04ubuntu-upgrade-linux-image-generic-lpae-lts-trustyubuntu-upgrade-linux-image-generic-lpae-lts-xenialubuntu-upgrade-linux-image-generic-lts-trustyubuntu-upgrade-linux-image-generic-lts-xenialubuntu-upgrade-linux-image-gkeubuntu-upgrade-linux-image-kvmubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-lowlatency-hwe-16-04ubuntu-upgrade-linux-image-lowlatency-lts-xenialubuntu-upgrade-linux-image-oemubuntu-upgrade-linux-image-powerpc-e500ubuntu-upgrade-linux-image-powerpc-e500mcubuntu-upgrade-linux-image-powerpc-e500mc-lts-xenialubuntu-upgrade-linux-image-powerpc-smpubuntu-upgrade-linux-image-powerpc-smp-lts-xenialubuntu-upgrade-linux-image-powerpc64-embubuntu-upgrade-linux-image-powerpc64-emb-lts-xenialubuntu-upgrade-linux-image-powerpc64-smpubuntu-upgrade-linux-image-powerpc64-smp-lts-xenialubuntu-upgrade-linux-image-raspi2ubuntu-upgrade-linux-image-snapdragon
References

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.