Vulnerability Name: | CVE-2018-11412 (CCN-143811) | ||||||||||||||||||||||||||||||||||||
Assigned: | 2018-05-22 | ||||||||||||||||||||||||||||||||||||
Published: | 2018-05-22 | ||||||||||||||||||||||||||||||||||||
Updated: | 2019-03-15 | ||||||||||||||||||||||||||||||||||||
Summary: | In the Linux kernel 4.13 through 4.16.11, ext4_read_inline_data() in fs/ext4/inline.c performs a memcpy with an untrusted length value in certain circumstances involving a crafted filesystem that stores the system.data extended attribute value in a dedicated inode. | ||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 5.9 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) 5.4 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:U/RC:R)
5.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:U/RC:R)
| ||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P)
| ||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-416 | ||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2018-11412 Source: BID Type: Third Party Advisory, VDB Entry 104291 Source: CCN Type: BID-104291 Linux kernel CVE-2018-11412 Out-of-Bounds Security Vulnerability Source: REDHAT Type: Third Party Advisory RHSA-2019:0525 Source: CCN Type: Chromium Web site Linux ext4: out-of-bounds memcpy via non-inline system.data xattr Source: MISC Type: Exploit, Third Party Advisory https://bugs.chromium.org/p/project-zero/issues/detail?id=1580 Source: CCN Type: Kernel.org Bugzilla Bug 199803 out-of-bounds memcpy via non-inline system.data xattr Source: MISC Type: Exploit, Issue Tracking, Third Party Advisory https://bugzilla.kernel.org/show_bug.cgi?id=199803 Source: XF Type: UNKNOWN linux-kernel-cve201811412-dos(143811) Source: CCN Type: Packet Storm Security [05-24-2018] Linux Ext4 Out-Of-Bounds Memcpy Source: CCN Type: Packet Storm Security [06-05-2018] Linux Kernel ext4_read_inline_data() Memory Corruption Source: UBUNTU Type: Third Party Advisory USN-3752-1 Source: UBUNTU Type: Third Party Advisory USN-3752-2 Source: UBUNTU Type: Third Party Advisory USN-3752-3 Source: EXPLOIT-DB Type: EXPLOIT Offensive Security Exploit Database [06-05-2018] Source: EXPLOIT-DB Type: Exploit, Third Party Advisory, VDB Entry 44832 Source: CCN Type: Linux Kernel Web site The Linux Kernel Archives Source: CCN Type: WhiteSource Vulnerability Database CVE-2018-11412 | ||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||
BACK |