2018-06-26 17:03:27 -04:00
{
2019-03-18 04:27:00 +00:00
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org" ,
"ID" : "CVE-2018-12896" ,
"STATE" : "PUBLIC"
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a" ,
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
} ,
"vendor_name" : "n/a"
}
]
}
} ,
"data_format" : "MITRE" ,
"data_type" : "CVE" ,
"data_version" : "4.0" ,
"description" : {
"description_data" : [
2018-07-02 13:04:31 -04:00
{
2019-03-18 04:27:00 +00:00
"lang" : "eng" ,
"value" : "An issue was discovered in the Linux kernel through 4.17.3. An Integer Overflow in kernel/time/posix-timers.c in the POSIX timer code is caused by the way the overrun accounting works. Depending on interval and expiry time values, the overrun can be larger than INT_MAX, but the accounting is int based. This basically makes the accounting values, which are visible to user space via timer_getoverrun(2) and siginfo::si_overrun, random. For example, a local user can cause a denial of service (signed integer overflow) via crafted mmap, futex, timer_create, and timer_settime system calls."
2018-07-02 13:04:31 -04:00
}
2019-03-18 04:27:00 +00:00
]
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "n/a"
}
]
}
]
} ,
"references" : {
"reference_data" : [
{
"name" : "https://bugzilla.kernel.org/show_bug.cgi?id=200189" ,
"refsource" : "MISC" ,
"url" : "https://bugzilla.kernel.org/show_bug.cgi?id=200189"
} ,
{
"name" : "USN-3848-2" ,
"refsource" : "UBUNTU" ,
"url" : "https://usn.ubuntu.com/3848-2/"
} ,
{
"name" : "USN-3847-1" ,
"refsource" : "UBUNTU" ,
"url" : "https://usn.ubuntu.com/3847-1/"
} ,
{
"name" : "https://github.com/torvalds/linux/commit/78c9c4dfbf8c04883941445a195276bb4bb92c76" ,
"refsource" : "MISC" ,
"url" : "https://github.com/torvalds/linux/commit/78c9c4dfbf8c04883941445a195276bb4bb92c76"
} ,
{
"name" : "USN-3847-2" ,
"refsource" : "UBUNTU" ,
"url" : "https://usn.ubuntu.com/3847-2/"
} ,
{
"name" : "USN-3849-1" ,
"refsource" : "UBUNTU" ,
"url" : "https://usn.ubuntu.com/3849-1/"
} ,
{
"name" : "USN-3849-2" ,
"refsource" : "UBUNTU" ,
"url" : "https://usn.ubuntu.com/3849-2/"
} ,
{
"name" : "USN-3848-1" ,
"refsource" : "UBUNTU" ,
"url" : "https://usn.ubuntu.com/3848-1/"
} ,
{
"name" : "USN-3847-3" ,
"refsource" : "UBUNTU" ,
"url" : "https://usn.ubuntu.com/3847-3/"
} ,
{
"name" : "https://github.com/lcytxw/bug_repro/tree/master/bug_200189" ,
"refsource" : "MISC" ,
"url" : "https://github.com/lcytxw/bug_repro/tree/master/bug_200189"
} ,
{
"refsource" : "MLIST" ,
"name" : "[debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update" ,
"url" : "https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html"
2019-03-27 19:00:45 +00:00
} ,
{
"refsource" : "MLIST" ,
"name" : "[debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update" ,
"url" : "https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html"
2019-04-01 21:00:51 +00:00
} ,
{
"refsource" : "MLIST" ,
"name" : "[debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update" ,
"url" : "https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html"
2019-03-18 04:27:00 +00:00
}
]
}
}