First published: Tue Jun 12 2018(Updated: )
In the ea_get function in fs/jfs/xattr.c in the Linux kernel through 4.17.1, a memory corruption bug in JFS can be triggered by calling setxattr twice with two different extended attribute names on the same file. This vulnerability can be triggered by an unprivileged user with the ability to create files and execute programs. A kmalloc call is incorrect, leading to slab-out-of-bounds in jfs_xattr.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | <=4.17.1 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Linux Linux kernel | >=2.6.12<3.16.58 | |
Linux Linux kernel | >=3.17<3.18.118 | |
Linux Linux kernel | >=3.19<4.4.147 | |
Linux Linux kernel | >=4.5<4.9.119 | |
Linux Linux kernel | >=4.10<4.14.62 | |
Linux Linux kernel | >=4.15<4.17.14 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.11.10-1 6.12.5-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2018-12233.
The title of this vulnerability is 'In the ea_get function in fs/jfs/xattr.c in the Linux kernel through 4.17.1 a memory corruption bug.'
This vulnerability can be triggered by calling setxattr twice with two different extended attribute names on the same file.
This vulnerability can be triggered by an unprivileged user with the ability to create files and set extended attributes.
The severity level of this vulnerability is not specified.