TROYANOSYVIRUS
Volver a CVEs

CVE-2018-10879

N/A

Descripcion

A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause a use-after-free in ext4_xattr_set_entry function and a denial of service or unspecified other impact may occur by renaming a file in a crafted ext4 filesystem image.

Detalles CVE

Puntuacion CVSS v3.1N/A
Publicado7/26/2018
Ultima modificacion11/21/2024
Fuentenvd
Avistamientos honeypot0

Productos afectados

canonical:ubuntu_linuxdebian:debian_linuxlinux:linux_kernelredhat:enterprise_linuxredhat:enterprise_linux_desktopredhat:enterprise_linux_serverredhat:enterprise_linux_workstation

Debilidades (CWE)

CWE-416CWE-416

Referencias

https://usn.ubuntu.com/3753-1/(secalert@redhat.com)
https://usn.ubuntu.com/3753-2/(secalert@redhat.com)
https://usn.ubuntu.com/3871-1/(secalert@redhat.com)
https://usn.ubuntu.com/3871-3/(secalert@redhat.com)
https://usn.ubuntu.com/3871-4/(secalert@redhat.com)
https://usn.ubuntu.com/3871-5/(secalert@redhat.com)
http://patchwork.ozlabs.org/patch/928666/(af854a3a-2127-422b-91ae-364da2661108)
http://patchwork.ozlabs.org/patch/928667/(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/104902(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2948(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:3083(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:3096(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.kernel.org/show_bug.cgi?id=200001(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3753-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3753-2/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3871-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3871-3/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3871-4/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3871-5/(af854a3a-2127-422b-91ae-364da2661108)

Correlaciones IOC

Sin correlaciones registradas

This product uses data from the NVD API but is not endorsed or certified by the NVD.