{"id":"CVE-2018-1000004","details":"In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.","modified":"2026-04-16T06:18:16.395915252Z","published":"2018-01-16T20:29:00.217Z","related":["SUSE-SU-2018:0383-1","SUSE-SU-2018:0416-1","SUSE-SU-2018:0437-1","SUSE-SU-2018:0482-1","SUSE-SU-2018:0525-1","SUSE-SU-2018:0555-1","SUSE-SU-2018:0660-1","SUSE-SU-2018:0841-1","SUSE-SU-2018:0986-1","SUSE-SU-2018:0988-1","SUSE-SU-2018:0989-1","SUSE-SU-2018:0992-1","SUSE-SU-2018:0993-1","SUSE-SU-2018:0994-1","SUSE-SU-2018:0995-1","SUSE-SU-2018:0996-1","SUSE-SU-2018:0997-1","SUSE-SU-2018:0999-1","SUSE-SU-2018:1000-1","SUSE-SU-2018:1001-1","SUSE-SU-2018:1004-1","SUSE-SU-2018:1005-1","SUSE-SU-2018:1006-1","SUSE-SU-2018:1007-1","SUSE-SU-2018:1008-1","SUSE-SU-2018:1009-1","SUSE-SU-2018:1010-1","SUSE-SU-2018:1011-1","SUSE-SU-2018:1012-1","SUSE-SU-2018:1013-1","SUSE-SU-2018:1014-1","SUSE-SU-2018:1015-1","SUSE-SU-2018:1018-1","SUSE-SU-2018:1019-1","SUSE-SU-2018:1020-1","SUSE-SU-2018:1021-1","SUSE-SU-2018:1022-1","SUSE-SU-2018:1023-1","SUSE-SU-2018:1024-1","SUSE-SU-2018:1025-1","SUSE-SU-2018:1027-1","SUSE-SU-2018:1028-1","SUSE-SU-2018:1029-1","SUSE-SU-2018:1031-1","SUSE-SU-2018:1032-1","SUSE-SU-2018:1033-1","SUSE-SU-2018:1034-1","openSUSE-SU-2024:10728-1","openSUSE-SU-2024:13704-1"],"references":[{"type":"WEB","url":"https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html"},{"type":"WEB","url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"type":"WEB","url":"http://www.securityfocus.com/bid/104606"},{"type":"WEB","url":"https://usn.ubuntu.com/3798-1/"},{"type":"WEB","url":"https://usn.ubuntu.com/3631-2/"},{"type":"WEB","url":"https://usn.ubuntu.com/3798-2/"},{"type":"WEB","url":"https://usn.ubuntu.com/3631-1/"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:2390"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:0654"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:0676"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1062"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:1483"},{"type":"ADVISORY","url":"https://www.debian.org/security/2018/dsa-4187"},{"type":"ADVISORY","url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"},{"type":"FIX","url":"http://seclists.org/oss-sec/2018/q1/51"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-1000004.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"2.6.0"}]},{"events":[{"introduced":"0"},{"last_affected":"3.10"}]},{"events":[{"introduced":"0"},{"last_affected":"4.12"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}