First published: Tue Jul 03 2018(Updated: )
An issue was discovered in fs/f2fs/super.c in the Linux kernel through 4.14. A denial of service (out-of-bounds memory access and BUG) can occur upon encountering an abnormal bitmap size when mounting a crafted f2fs image.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <=4.14 | |
Debian GNU/Linux | =8.0 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =18.04 | |
openSUSE | =42.3 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.119-1 6.12.11-1 6.12.12-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-13096 has a severity level that allows for a denial of service due to out-of-bounds memory access.
To fix CVE-2018-13096, update to a patched version of the Linux kernel such as 5.10.223-1 or newer.
CVE-2018-13096 affects all versions of the Linux kernel up to and including 4.14.
CVE-2018-13096 is caused by encountering an abnormal bitmap size when mounting a crafted f2fs image.
Yes, Debian, Ubuntu, and openSUSE distributions along with their specified versions are affected by CVE-2018-13096.