In the Linux kernel before 4.17, a local attacker able to set attributes on an xfs filesystem could make this filesystem non-operational until the next mount by triggering an unchecked error condition during an xfs attribute change, because xfs_attr_shortform_addname in fs/xfs/libxfs/xfs_attr.c mishandles ATTR_REPLACE operations with conversion of an attr from short to long form.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 03:56
Type | Values Removed | Values Added |
---|---|---|
References | () http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7b38460dc8e4eafba06c78f8e37099d3b34d473c - Patch, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/105753 - Third Party Advisory, VDB Entry | |
References | () https://bugzilla.kernel.org/show_bug.cgi?id=199119 - Exploit, Issue Tracking, Vendor Advisory | |
References | () https://bugzilla.suse.com/show_bug.cgi?id=1105025 - Issue Tracking, Third Party Advisory | |
References | () https://github.com/torvalds/linux/commit/7b38460dc8e4eafba06c78f8e37099d3b34d473c - Patch, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html - Mailing List, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html - Mailing List, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html - Mailing List, Third Party Advisory | |
References | () https://usn.ubuntu.com/3847-1/ - Third Party Advisory | |
References | () https://usn.ubuntu.com/3847-2/ - Third Party Advisory | |
References | () https://usn.ubuntu.com/3847-3/ - Third Party Advisory | |
References | () https://usn.ubuntu.com/3848-1/ - Third Party Advisory | |
References | () https://usn.ubuntu.com/3848-2/ - Third Party Advisory | |
References | () https://usn.ubuntu.com/3849-1/ - Third Party Advisory | |
References | () https://usn.ubuntu.com/3849-2/ - Third Party Advisory |
Information
Published : 2018-10-26 18:29
Updated : 2024-11-21 03:56
NVD link : CVE-2018-18690
Mitre link : CVE-2018-18690
CVE.ORG link : CVE-2018-18690
JSON object : View
Products Affected
canonical
- ubuntu_linux
linux
- linux_kernel
debian
- debian_linux
CWE
CWE-754
Improper Check for Unusual or Exceptional Conditions