Vulnerability Details : CVE-2018-10879
Potential exploit
A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause a use-after-free in ext4_xattr_set_entry function and a denial of service or unspecified other impact may occur by renaming a file in a crafted ext4 filesystem image.
Vulnerability category: Memory CorruptionDenial of service
Products affected by CVE-2018-10879
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2018-10879
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 8 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2018-10879
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.1
|
MEDIUM | AV:L/AC:L/Au:N/C:P/I:P/A:C |
3.9
|
8.5
|
NIST | |
7.8
|
HIGH | CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST | |
4.2
|
MEDIUM | CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H |
0.5
|
3.6
|
Red Hat, Inc. |
CWE ids for CVE-2018-10879
-
The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer.Assigned by:
- nvd@nist.gov (Secondary)
- secalert@redhat.com (Primary)
References for CVE-2018-10879
-
https://access.redhat.com/errata/RHSA-2018:3096
RHSA-2018:3096 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://bugzilla.kernel.org/show_bug.cgi?id=200001
200001 – use-after-free detected by KASAN in ext4_xattr_set_entry when renaming a file in a crafted ext4 imageExploit;Issue Tracking;Vendor Advisory
-
https://access.redhat.com/errata/RHSA-2018:2948
RHSA-2018:2948 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://access.redhat.com/errata/RHSA-2018:3083
RHSA-2018:3083 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=513f86d73855ce556ea9522b6bfd79f87356dc3a
kernel/git/torvalds/linux.git - Linux kernel source treePatch;Vendor Advisory
-
https://usn.ubuntu.com/3871-3/
USN-3871-3: Linux kernel (AWS, GCP, KVM, OEM, Raspberry Pi 2) vulnerabilities | Ubuntu security noticesThird Party Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10879
1596806 – (CVE-2018-10879) CVE-2018-10879 kernel: use-after-free detected in ext4_xattr_set_entry with a crafted fileIssue Tracking;Patch;Third Party Advisory
-
https://usn.ubuntu.com/3753-2/
USN-3753-2: Linux kernel (Xenial HWE) vulnerabilities | Ubuntu security noticesThird Party Advisory
-
https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html
[SECURITY] [DLA 1423-1] linux-4.9 new packageMailing List;Third Party Advisory
-
http://www.securityfocus.com/bid/104902
Linux Kernel CVE-2018-10879 Local Denial of Service VulnerabilityThird Party Advisory;VDB Entry
-
http://patchwork.ozlabs.org/patch/928667/
[2/2] ext4: always verify the magic number in xattr blocks - PatchworkPatch;Third Party Advisory
-
https://usn.ubuntu.com/3871-1/
USN-3871-1: Linux kernel vulnerabilities | Ubuntu security noticesThird Party Advisory
-
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5369a762c882c0b6e9599e4ebbb3a9ba9eee7e2d
kernel/git/torvalds/linux.git - Linux kernel source treePatch;Vendor Advisory
-
https://usn.ubuntu.com/3871-4/
USN-3871-4: Linux kernel (HWE) vulnerabilities | Ubuntu security noticesThird Party Advisory
-
https://usn.ubuntu.com/3753-1/
USN-3753-1: Linux kernel vulnerabilities | Ubuntu security noticesThird Party Advisory
-
http://patchwork.ozlabs.org/patch/928666/
[1/2] ext4: add corruption check in ext4_xattr_set_entry() - PatchworkPatch;Third Party Advisory
-
https://usn.ubuntu.com/3871-5/
USN-3871-5: Linux kernel (Azure) vulnerabilities | Ubuntu security noticesThird Party Advisory
Jump to