TROYANOSYVIRUS
Back to CVEs

CVE-2018-10879

N/A

Description

A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause a use-after-free in ext4_xattr_set_entry function and a denial of service or unspecified other impact may occur by renaming a file in a crafted ext4 filesystem image.

CVE Details

CVSS v3.1 ScoreN/A
Published7/26/2018
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0

Affected Products

canonical:ubuntu_linuxdebian:debian_linuxlinux:linux_kernelredhat:enterprise_linuxredhat:enterprise_linux_desktopredhat:enterprise_linux_serverredhat:enterprise_linux_workstation

Weaknesses (CWE)

CWE-416CWE-416

References

https://usn.ubuntu.com/3753-1/(secalert@redhat.com)
https://usn.ubuntu.com/3753-2/(secalert@redhat.com)
https://usn.ubuntu.com/3871-1/(secalert@redhat.com)
https://usn.ubuntu.com/3871-3/(secalert@redhat.com)
https://usn.ubuntu.com/3871-4/(secalert@redhat.com)
https://usn.ubuntu.com/3871-5/(secalert@redhat.com)
http://patchwork.ozlabs.org/patch/928666/(af854a3a-2127-422b-91ae-364da2661108)
http://patchwork.ozlabs.org/patch/928667/(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/104902(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2948(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:3083(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:3096(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.kernel.org/show_bug.cgi?id=200001(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3753-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3753-2/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3871-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3871-3/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3871-4/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3871-5/(af854a3a-2127-422b-91ae-364da2661108)

IOC Correlations

No correlations recorded

This product uses data from the NVD API but is not endorsed or certified by the NVD.