Lucene search

K
nvd[email protected]NVD:CVE-2018-10938
HistoryAug 27, 2018 - 1:29 p.m.

CVE-2018-10938

2018-08-2713:29:00
CWE-835
web.nvd.nist.gov
10

CVSS2

7.1

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:N/I:N/A:C

CVSS3

5.9

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

6

Confidence

High

EPSS

0.022

Percentile

89.6%

A flaw was found in the Linux kernel present since v4.0-rc1 and through v4.13-rc4. A crafted network packet sent remotely by an attacker may force the kernel to enter an infinite loop in the cipso_v4_optptr() function in net/ipv4/cipso_ipv4.c leading to a denial-of-service. A certain non-default configuration of LSM (Linux Security Module) and NetLabel should be set up on a system before an attacker could leverage this flaw.

Affected configurations

Nvd
Node
linuxlinux_kernelMatch4.0
OR
linuxlinux_kernelMatch4.0rc1
OR
linuxlinux_kernelMatch4.0rc2
OR
linuxlinux_kernelMatch4.0rc3
OR
linuxlinux_kernelMatch4.0rc4
OR
linuxlinux_kernelMatch4.0rc5
OR
linuxlinux_kernelMatch4.0rc6
OR
linuxlinux_kernelMatch4.0rc7
OR
linuxlinux_kernelMatch4.1
OR
linuxlinux_kernelMatch4.1rc1
OR
linuxlinux_kernelMatch4.1rc2
OR
linuxlinux_kernelMatch4.1rc3
OR
linuxlinux_kernelMatch4.1rc4
OR
linuxlinux_kernelMatch4.1rc5
OR
linuxlinux_kernelMatch4.1rc6
OR
linuxlinux_kernelMatch4.1rc7
OR
linuxlinux_kernelMatch4.1rc8
OR
linuxlinux_kernelMatch4.2
OR
linuxlinux_kernelMatch4.2rc1
OR
linuxlinux_kernelMatch4.2rc2
OR
linuxlinux_kernelMatch4.2rc3
OR
linuxlinux_kernelMatch4.2rc4
OR
linuxlinux_kernelMatch4.2rc5
OR
linuxlinux_kernelMatch4.2rc6
OR
linuxlinux_kernelMatch4.2rc7
OR
linuxlinux_kernelMatch4.2rc8
OR
linuxlinux_kernelMatch4.3
OR
linuxlinux_kernelMatch4.3rc1
OR
linuxlinux_kernelMatch4.3rc2
OR
linuxlinux_kernelMatch4.3rc3
OR
linuxlinux_kernelMatch4.3rc4
OR
linuxlinux_kernelMatch4.3rc5
OR
linuxlinux_kernelMatch4.3rc6
OR
linuxlinux_kernelMatch4.3rc7
OR
linuxlinux_kernelMatch4.4
OR
linuxlinux_kernelMatch4.4rc1
OR
linuxlinux_kernelMatch4.4rc2
OR
linuxlinux_kernelMatch4.4rc3
OR
linuxlinux_kernelMatch4.4rc4
OR
linuxlinux_kernelMatch4.4rc5
OR
linuxlinux_kernelMatch4.4rc6
OR
linuxlinux_kernelMatch4.4rc7
OR
linuxlinux_kernelMatch4.4rc8
OR
linuxlinux_kernelMatch4.5
OR
linuxlinux_kernelMatch4.5rc1
OR
linuxlinux_kernelMatch4.5rc2
OR
linuxlinux_kernelMatch4.5rc3
OR
linuxlinux_kernelMatch4.5rc4
OR
linuxlinux_kernelMatch4.5rc5
OR
linuxlinux_kernelMatch4.5rc6
OR
linuxlinux_kernelMatch4.5rc7
OR
linuxlinux_kernelMatch4.6
OR
linuxlinux_kernelMatch4.6rc1
OR
linuxlinux_kernelMatch4.6rc2
OR
linuxlinux_kernelMatch4.6rc3
OR
linuxlinux_kernelMatch4.6rc4
OR
linuxlinux_kernelMatch4.6rc5
OR
linuxlinux_kernelMatch4.6rc6
OR
linuxlinux_kernelMatch4.6rc7
OR
linuxlinux_kernelMatch4.7
OR
linuxlinux_kernelMatch4.7rc1
OR
linuxlinux_kernelMatch4.7rc2
OR
linuxlinux_kernelMatch4.7rc3
OR
linuxlinux_kernelMatch4.7rc4
OR
linuxlinux_kernelMatch4.7rc5
OR
linuxlinux_kernelMatch4.7rc6
OR
linuxlinux_kernelMatch4.7rc7
OR
linuxlinux_kernelMatch4.8
OR
linuxlinux_kernelMatch4.8rc1
OR
linuxlinux_kernelMatch4.8rc2
OR
linuxlinux_kernelMatch4.8rc3
OR
linuxlinux_kernelMatch4.8rc4
OR
linuxlinux_kernelMatch4.8rc5
OR
linuxlinux_kernelMatch4.8rc6
OR
linuxlinux_kernelMatch4.8rc7
OR
linuxlinux_kernelMatch4.8rc8
OR
linuxlinux_kernelMatch4.9
OR
linuxlinux_kernelMatch4.9rc1
OR
linuxlinux_kernelMatch4.9rc2
OR
linuxlinux_kernelMatch4.9rc3
OR
linuxlinux_kernelMatch4.9rc4
OR
linuxlinux_kernelMatch4.9rc5
OR
linuxlinux_kernelMatch4.9rc6
OR
linuxlinux_kernelMatch4.9rc7
OR
linuxlinux_kernelMatch4.9rc8
OR
linuxlinux_kernelMatch4.10
OR
linuxlinux_kernelMatch4.10rc1
OR
linuxlinux_kernelMatch4.10rc2
OR
linuxlinux_kernelMatch4.10rc3
OR
linuxlinux_kernelMatch4.10rc4
OR
linuxlinux_kernelMatch4.10rc5
OR
linuxlinux_kernelMatch4.10rc6
OR
linuxlinux_kernelMatch4.10rc7
OR
linuxlinux_kernelMatch4.10rc8
OR
linuxlinux_kernelMatch4.11
OR
linuxlinux_kernelMatch4.11rc1
OR
linuxlinux_kernelMatch4.11rc2
OR
linuxlinux_kernelMatch4.11rc3
OR
linuxlinux_kernelMatch4.11rc4
OR
linuxlinux_kernelMatch4.11rc5
OR
linuxlinux_kernelMatch4.11rc6
OR
linuxlinux_kernelMatch4.11rc7
OR
linuxlinux_kernelMatch4.11rc8
OR
linuxlinux_kernelMatch4.12
OR
linuxlinux_kernelMatch4.12rc1
OR
linuxlinux_kernelMatch4.12rc2
OR
linuxlinux_kernelMatch4.12rc3
OR
linuxlinux_kernelMatch4.12rc4
OR
linuxlinux_kernelMatch4.12rc5
OR
linuxlinux_kernelMatch4.12rc6
OR
linuxlinux_kernelMatch4.12rc7
OR
linuxlinux_kernelMatch4.13rc1
OR
linuxlinux_kernelMatch4.13rc2
OR
linuxlinux_kernelMatch4.13rc3
OR
linuxlinux_kernelMatch4.13rc4
Node
canonicalubuntu_linuxMatch14.04lts
OR
canonicalubuntu_linuxMatch16.04lts
OR
debiandebian_linuxMatch9.0

CVSS2

7.1

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:N/I:N/A:C

CVSS3

5.9

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

6

Confidence

High

EPSS

0.022

Percentile

89.6%