← Retour aux CVEs
CVE-2018-10879
N/ADescription
A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause a use-after-free in ext4_xattr_set_entry function and a denial of service or unspecified other impact may occur by renaming a file in a crafted ext4 filesystem image.
Details CVE
Score CVSS v3.1N/A
Publie7/26/2018
Derniere modification11/21/2024
Sourcenvd
Observations honeypot0
Produits affectes
canonical:ubuntu_linuxdebian:debian_linuxlinux:linux_kernelredhat:enterprise_linuxredhat:enterprise_linux_desktopredhat:enterprise_linux_serverredhat:enterprise_linux_workstation
Faiblesses (CWE)
CWE-416CWE-416
References
http://patchwork.ozlabs.org/patch/928666/(secalert@redhat.com)
http://patchwork.ozlabs.org/patch/928667/(secalert@redhat.com)
http://www.securityfocus.com/bid/104902(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2018:2948(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2018:3083(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2018:3096(secalert@redhat.com)
https://bugzilla.kernel.org/show_bug.cgi?id=200001(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10879(secalert@redhat.com)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=513f86d73855ce556ea9522b6bfd79f87356dc3a(secalert@redhat.com)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5369a762c882c0b6e9599e4ebbb3a9ba9eee7e2d(secalert@redhat.com)
https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html(secalert@redhat.com)
https://usn.ubuntu.com/3753-1/(secalert@redhat.com)
https://usn.ubuntu.com/3753-2/(secalert@redhat.com)
https://usn.ubuntu.com/3871-1/(secalert@redhat.com)
https://usn.ubuntu.com/3871-3/(secalert@redhat.com)
https://usn.ubuntu.com/3871-4/(secalert@redhat.com)
https://usn.ubuntu.com/3871-5/(secalert@redhat.com)
http://patchwork.ozlabs.org/patch/928666/(af854a3a-2127-422b-91ae-364da2661108)
http://patchwork.ozlabs.org/patch/928667/(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/104902(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2948(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:3083(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:3096(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.kernel.org/show_bug.cgi?id=200001(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10879(af854a3a-2127-422b-91ae-364da2661108)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=513f86d73855ce556ea9522b6bfd79f87356dc3a(af854a3a-2127-422b-91ae-364da2661108)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5369a762c882c0b6e9599e4ebbb3a9ba9eee7e2d(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3753-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3753-2/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3871-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3871-3/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3871-4/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3871-5/(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.