CVE-2018-11412

MEDIUM

Linux Kernel < 4.16.11 - Use After Free

Title source: rule
STIX 2.1

Description

In the Linux kernel 4.13 through 4.16.11, ext4_read_inline_data() in fs/ext4/inline.c performs a memcpy with an untrusted length value in certain circumstances involving a crafted filesystem that stores the system.data extended attribute value in a dedicated inode.

Exploits (1)

exploitdb WORKING POC
by Google Security Research · textdoslinux
https://www.exploit-db.com/exploits/44832

References (8)

Core 8
Core References
Third Party Advisory vendor-advisory x_refsource_ubuntu
https://usn.ubuntu.com/3752-2/
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/104291
Exploit, Third Party Advisory x_refsource_misc
https://bugs.chromium.org/p/project-zero/issues/detail?id=1580
Third Party Advisory vendor-advisory x_refsource_ubuntu
https://usn.ubuntu.com/3752-3/
Exploit, Issue Tracking, Third Party Advisory x_refsource_misc
https://bugzilla.kernel.org/show_bug.cgi?id=199803
Exploit, Third Party Advisory, VDB Entry exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/44832/
Third Party Advisory vendor-advisory x_refsource_redhat
https://access.redhat.com/errata/RHSA-2019:0525
Third Party Advisory vendor-advisory x_refsource_ubuntu
https://usn.ubuntu.com/3752-1/

Scores

CVSS v3 5.9
EPSS 0.1120
EPSS Percentile 93.5%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

Details

CWE
CWE-416
Status published
Products (3)
canonical/ubuntu_linux 16.04
canonical/ubuntu_linux 18.04
linux/linux_kernel 4.13 - 4.16.11
Published May 24, 2018
Tracked Since Feb 18, 2026