First published: Sat Sep 22 2018(Updated: )
UDisks 2.8.0 has a format string vulnerability in udisks_log in udiskslogging.c, allowing attackers to obtain sensitive information (stack contents), cause a denial of service (memory corruption), or possibly have unspecified other impact via a malformed filesystem label, as demonstrated by %d or %n substrings.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Freedesktop Udisks | =2.8.0 | |
Canonical Ubuntu Linux | =18.04 | |
debian/udisks2 | 2.8.1-4 2.8.1-4+deb10u2 2.9.2-2+deb11u1 2.9.4-4 2.10.1-5 | |
ubuntu/udisks2 | <2.7.6-3ubuntu0.2 | 2.7.6-3ubuntu0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-17336 is a format string vulnerability in UDisks 2.8.0 that allows attackers to obtain sensitive information, cause a denial of service, or have other unspecified impact.
The severity of CVE-2018-17336 is high, with a CVSS score of 7.8.
Attackers can exploit CVE-2018-17336 by using a malformed filesystem label with format string specifiers such as %d or %n.
The affected software includes UDisks 2.8.0 on Ubuntu 18.04 LTS and UDisks 2.8.0 on Canonical Ubuntu Linux. The exact versions may vary.
To fix CVE-2018-17336, it is recommended to update UDisks to version 2.8.1-4 or later.