← Volver a CVEs
CVE-2018-10881
N/ADescripcion
A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bound access in ext4_get_group_info function, a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image.
Detalles CVE
Puntuacion CVSS v3.1N/A
Publicado7/26/2018
Ultima modificacion11/21/2024
Fuentenvd
Avistamientos honeypot0
Productos afectados
canonical:ubuntu_linuxdebian:debian_linuxlinux:linux_kernelredhat:enterprise_linux_desktopredhat:enterprise_linux_for_real_timeredhat:enterprise_linux_for_real_time_for_nfvredhat:enterprise_linux_serverredhat:enterprise_linux_workstation
Debilidades (CWE)
CWE-787CWE-119
Referencias
http://patchwork.ozlabs.org/patch/929792/(secalert@redhat.com)
http://www.securityfocus.com/bid/104901(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2018:2948(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2018:3083(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2018:3096(secalert@redhat.com)
https://bugzilla.kernel.org/show_bug.cgi?id=200015(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10881(secalert@redhat.com)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6e8ab72a812396996035a37e5ca4b3b99b5d214b(secalert@redhat.com)
https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html(secalert@redhat.com)
https://usn.ubuntu.com/3752-1/(secalert@redhat.com)
https://usn.ubuntu.com/3752-2/(secalert@redhat.com)
https://usn.ubuntu.com/3752-3/(secalert@redhat.com)
https://usn.ubuntu.com/3753-1/(secalert@redhat.com)
https://usn.ubuntu.com/3753-2/(secalert@redhat.com)
https://usn.ubuntu.com/3754-1/(secalert@redhat.com)
http://patchwork.ozlabs.org/patch/929792/(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/104901(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2948(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:3083(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:3096(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.kernel.org/show_bug.cgi?id=200015(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10881(af854a3a-2127-422b-91ae-364da2661108)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6e8ab72a812396996035a37e5ca4b3b99b5d214b(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3752-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3752-2/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3752-3/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3753-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3753-2/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3754-1/(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.