Description
In the Linux kernel 4.13 through 4.16.11, ext4_read_inline_data() in fs/ext4/inline.c performs a memcpy with an untrusted length value in certain circumstances involving a crafted filesystem that stores the system.data extended attribute value in a dedicated inode.
Exploits (1)
exploitdb
WORKING POC
by Google Security Research · textdoslinux
https://www.exploit-db.com/exploits/44832
References (8)
Core 8
Core References
Third Party Advisory vendor-advisory
x_refsource_ubuntu
https://usn.ubuntu.com/3752-2/
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/104291
Exploit, Third Party Advisory x_refsource_misc
https://bugs.chromium.org/p/project-zero/issues/detail?id=1580
Third Party Advisory vendor-advisory
x_refsource_ubuntu
https://usn.ubuntu.com/3752-3/
Exploit, Issue Tracking, Third Party Advisory x_refsource_misc
https://bugzilla.kernel.org/show_bug.cgi?id=199803
Exploit, Third Party Advisory, VDB Entry exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/44832/
Third Party Advisory vendor-advisory
x_refsource_redhat
https://access.redhat.com/errata/RHSA-2019:0525
Third Party Advisory vendor-advisory
x_refsource_ubuntu
https://usn.ubuntu.com/3752-1/
Scores
CVSS v3
5.9
EPSS
0.1120
EPSS Percentile
93.5%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Details
CWE
CWE-416
Status
published
Products (3)
canonical/ubuntu_linux
16.04
canonical/ubuntu_linux
18.04
linux/linux_kernel
4.13 - 4.16.11
Published
May 24, 2018
Tracked Since
Feb 18, 2026