CVE-2018-10879
low-risk
Published 2018-07-26
A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause a use-after-free in ext4_xattr_set_entry function and a denial of service or unspecified other impact may occur by renaming a file in a crafted ext4 filesystem image.
Do I need to act?
-
0.03% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
4
CVSS 4.2/10
Medium
PHYSICAL
/ HIGH complexity
Affected Products (9)
References (34)
Third Party Advisory
http://www.securityfocus.com/bid/104902
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2948
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3083
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3096
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10879
Third Party Advisory
https://usn.ubuntu.com/3753-1/
Third Party Advisory
https://usn.ubuntu.com/3753-2/
Third Party Advisory
https://usn.ubuntu.com/3871-1/
Third Party Advisory
https://usn.ubuntu.com/3871-3/
Third Party Advisory
https://usn.ubuntu.com/3871-4/
Third Party Advisory
https://usn.ubuntu.com/3871-5/
Third Party Advisory
http://www.securityfocus.com/bid/104902
and 14 more references
26
/ 100
low-risk
Severity
11/34 · Low
Exploitability
0/34 · Minimal
Exposure
15/34 · Moderate