CVE-2018-10876
kernel: use-after-free in jbd2_journal_commit_transaction funtion
Severity Score
5.5
*CVSS v3
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
1
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
A flaw was found in Linux kernel in the ext4 filesystem code. A use-after-free is possible in ext4_ext_remove_space() function when mounting and operating a crafted ext4 image.
Se ha detectado una vulnerabilidad en el kernel de Linux en el código del sistema de archivos ext4. Es posible un uso de memoria previamente liberada en la función ext4_ext_remove_space() cuando se monta y opera una imagen ext4 manipulada.
A flaw was found in the Linux kernel's ext4 filesystem code. A use-after-free is possible in ext4_ext_remove_space() function when mounting and operating a crafted ext4 image.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2018-05-09 CVE Reserved
- 2018-07-26 CVE Published
- 2023-07-20 EPSS Updated
- 2024-08-05 CVE Updated
- 2024-08-05 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-416: Use After Free
CAPEC
References (16)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/104904 | Vdb Entry | |
http://www.securityfocus.com/bid/106503 | Third Party Advisory | |
https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html | Mailing List |
URL | Date | SRC |
---|---|---|
https://bugzilla.kernel.org/show_bug.cgi?id=199403 | 2024-08-05 |
URL | Date | SRC |
---|---|---|
https://access.redhat.com/errata/RHSA-2019:0525 | 2023-02-13 | |
https://usn.ubuntu.com/3753-1 | 2023-02-13 | |
https://usn.ubuntu.com/3753-2 | 2023-02-13 | |
https://usn.ubuntu.com/3871-1 | 2023-02-13 | |
https://usn.ubuntu.com/3871-3 | 2023-02-13 | |
https://usn.ubuntu.com/3871-4 | 2023-02-13 | |
https://usn.ubuntu.com/3871-5 | 2023-02-13 | |
https://access.redhat.com/security/cve/CVE-2018-10876 | 2019-03-13 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1596773 | 2019-03-13 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | - | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 14.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "14.04" | lts |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 16.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "16.04" | lts |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 18.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "18.04" | lts |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 8.0 Search vendor "Debian" for product "Debian Linux" and version "8.0" | - |
Affected
|