First published: Mon Jul 02 2018(Updated: )
An issue was discovered in the Linux kernel through 4.17.3. An Integer Overflow in kernel/time/posix-timers.c in the POSIX timer code is caused by the way the overrun accounting works. Depending on interval and expiry time values, the overrun can be larger than INT_MAX, but the accounting is int based. This basically makes the accounting values, which are visible to user space via timer_getoverrun(2) and siginfo::si_overrun, random. For example, a local user can cause a denial of service (signed integer overflow) via crafted mmap, futex, timer_create, and timer_settime system calls.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.16-1 | |
Linux kernel | <=4.17.3 | |
Debian | =8.0 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-12896 is classified as a high-severity vulnerability due to its potential for integer overflow leading to system instability.
To fix CVE-2018-12896, upgrade to a patched version of the Linux kernel, specifically 5.10.223-1, 5.10.226-1, 6.1.123-1, or later.
CVE-2018-12896 affects Linux kernel versions up to and including 4.17.3.
Systems using vulnerable versions of the Linux kernel include various distributions of Debian and Ubuntu Linux.
CVE-2018-12896 could potentially be exploited locally, but it requires specific conditions related to POSIX timers.