Vulnerability Name: | CVE-2018-13096 (CCN-145961) | ||||||||||||||||||||||||||||||||||||||||||||
Assigned: | 2018-06-28 | ||||||||||||||||||||||||||||||||||||||||||||
Published: | 2018-06-28 | ||||||||||||||||||||||||||||||||||||||||||||
Updated: | 2022-10-07 | ||||||||||||||||||||||||||||||||||||||||||||
Summary: | An issue was discovered in fs/f2fs/super.c in the Linux kernel through 4.14. A denial of service (out-of-bounds memory access and BUG) can occur upon encountering an abnormal bitmap size when mounting a crafted f2fs image. | ||||||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 5.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) 4.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
4.8 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P)
| ||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-125 CWE-787 | ||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2018-13096 Source: SUSE Type: Mailing List, Third Party Advisory openSUSE-SU-2018:3202 Source: MISC Type: Third Party Advisory, VDB Entry http://packetstormsecurity.com/files/151420/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html Source: CCN Type: IBM Security Bulletin 843434 (API Connect) IBM API Connect has addressed multiple vulnerabilities in Developer Portal's dependencies - Cumulative list from June 28, 2018 to December 13, 2018 Source: MISC Type: Issue Tracking, Third Party Advisory https://bugzilla.kernel.org/show_bug.cgi?id=200167 Source: XF Type: UNKNOWN linux-kernel-cve201813096-dos(145961) Source: CCN Type: Linux Kernel GIT Repository f2fs: fix to do sanity check with {sit,nat}_ver_bitmap_bytesize Source: CONFIRM Type: Mailing List, Patch, Vendor Advisory https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=e34438c903b653daca2b2a7de95aed46226f8ed3 Source: MISC Type: Mailing List, Patch, Vendor Advisory https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e34438c903b653daca2b2a7de95aed46226f8ed3 Source: MLIST Type: Mailing List, Third Party Advisory [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update Source: BUGTRAQ Type: Mailing List, Patch, Third Party Advisory 20190130 [slackware-security] Slackware 14.2 kernel (SSA:2019-030-01) Source: UBUNTU Type: Third Party Advisory USN-3821-1 Source: UBUNTU Type: Third Party Advisory USN-3821-2 Source: UBUNTU Type: Third Party Advisory USN-4094-1 Source: UBUNTU Type: Third Party Advisory USN-4118-1 | ||||||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration 4: Configuration CCN 1: ![]() | ||||||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||
BACK |