First published: Wed Jun 13 2018(Updated: )
It was found that the raw midi kernel driver does not protect against concurrent access which leads to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmidi.c file. A malicious local attacker could possibly use this for privilege escalation.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.13-1 | |
Debian | =8.0 | |
Debian | =9.0 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Linux Kernel | ||
redhat enterprise Linux desktop | =6.0 | |
redhat enterprise Linux desktop | =7.0 | |
redhat enterprise Linux server | =6.0 | |
redhat enterprise Linux server | =7.0 | |
redhat enterprise Linux workstation | =6.0 | |
redhat enterprise Linux workstation | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-10902 is classified as medium due to the potential for local attackers to exploit the vulnerability.
To fix CVE-2018-10902, update your kernel to the latest available version, specifically versions such as 5.10.223-1 or 6.1.123-1 depending on your distribution.
CVE-2018-10902 affects specific versions of Debian, Ubuntu, Red Hat Enterprise Linux, and the Linux Kernel.
CVE-2018-10902 facilitates local privilege escalation attacks due to inadequate protection against concurrent access.
CVE-2018-10902 has been addressed in kernel updates released after its discovery, so ensure your system is running an updated kernel version.