First published: Mon Jun 04 2018(Updated: )
A buffer overflow due to a singed-unsigned comparsion was found in hidp_process_report() in the net/bluetooth/hidp/core.c in the Linux kernel. The buffer length is an unsigned int but gets cast to a signed int which in certain conditions can lead to a system panic and a denial-of-service. Introduced by: <a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4b1b5877b514b276f0f31efe02388a9c2836728">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4b1b5877b514b276f0f31efe02388a9c2836728</a> Fixed by: <a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7992c18810e568b95c869b227137a2215702a805">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7992c18810e568b95c869b227137a2215702a805</a>
Credit: security@android.com security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | ||
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Linux Linux kernel | >=3.14<3.16.58 | |
Linux Linux kernel | >=3.17<3.18.119 | |
Linux Linux kernel | >=3.19<4.4.149 | |
Linux Linux kernel | >=4.5<4.9.121 | |
Linux Linux kernel | >=4.10<4.14.64 | |
Linux Linux kernel | >=4.15<4.17.16 | |
Linux Linux kernel | >=4.18<4.18.2 | |
Google Android | ||
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.11.10-1 6.12.5-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2018-9363.
The severity of CVE-2018-9363 is high.
CVE-2018-9363 affects Android kernel versions and various Ubuntu Linux packages.
No, user interaction is not needed for exploitation of CVE-2018-9363.
You can find more information about CVE-2018-9363 in the references provided.