CVE-2018-12714
24.06.2018, 23:29
An issue was discovered in the Linux kernel through 4.17.2. The filter parsing in kernel/trace/trace_events_filter.c could be called with no filter, which is an N=0 case when it expected at least one line to have been read, thus making the N-1 index invalid. This allows attackers to cause a denial of service (slab out-of-bounds write) or possibly have unspecified other impact via crafted perf_event_open and mmap system calls.Enginsight
Vendor | Product | Version |
---|---|---|
linux | linux_kernel | 4.17 ≤ 𝑥 < 4.17.4 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||
---|---|---|---|---|---|---|---|---|---|
linux |
| ||||||||
linux-aws |
| ||||||||
linux-azure |
| ||||||||
linux-azure-edge |
| ||||||||
linux-euclid |
| ||||||||
linux-flo |
| ||||||||
linux-gcp |
| ||||||||
linux-gke |
| ||||||||
linux-goldfish |
| ||||||||
linux-grouper |
| ||||||||
linux-hwe |
| ||||||||
linux-hwe-edge |
| ||||||||
linux-kvm |
| ||||||||
linux-lts-trusty |
| ||||||||
linux-lts-utopic |
| ||||||||
linux-lts-vivid |
| ||||||||
linux-lts-wily |
| ||||||||
linux-lts-xenial |
| ||||||||
linux-maguro |
| ||||||||
linux-mako |
| ||||||||
linux-manta |
| ||||||||
linux-oem |
| ||||||||
linux-raspi2 |
| ||||||||
linux-snapdragon |
|
Common Weakness Enumeration
References