CVE-2018-10938
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
27/08/2018
Last modified:
03/10/2019
Description
A flaw was found in the Linux kernel present since v4.0-rc1 and through v4.13-rc4. A crafted network packet sent remotely by an attacker may force the kernel to enter an infinite loop in the cipso_v4_optptr() function in net/ipv4/cipso_ipv4.c leading to a denial-of-service. A certain non-default configuration of LSM (Linux Security Module) and NetLabel should be set up on a system before an attacker could leverage this flaw.
Impact
Base Score 3.x
5.90
Severity 3.x
MEDIUM
Base Score 2.0
7.10
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:4.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:4.0:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:4.0:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:4.0:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:4.0:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:4.0:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:4.0:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:4.0:rc7:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:4.1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:4.1:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:4.1:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:4.1:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:4.1:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:4.1:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:4.1:rc6:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://seclists.org/oss-sec/2018/q3/179
- http://www.securityfocus.com/bid/105154
- http://www.securitytracker.com/id/1041569
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10938
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=40413955ee265a5e42f710940ec78f5450d49149
- https://lists.debian.org/debian-lts-announce/2018/10/msg00003.html
- https://usn.ubuntu.com/3797-1/
- https://usn.ubuntu.com/3797-2/
- https://www.debian.org/security/2018/dsa-4308



