605
VMScore

CVE-2018-12233

Published: 12/06/2018 Updated: 09/02/2024
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

In the ea_get function in fs/jfs/xattr.c in the Linux kernel up to and including 4.17.1, a memory corruption bug in JFS can be triggered by calling setxattr twice with two different extended attribute names on the same file. This vulnerability can be triggered by an unprivileged user with the ability to create files and execute programs. A kmalloc call is incorrect, leading to slab-out-of-bounds in jfs_xattr.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

canonical ubuntu linux 16.04

canonical ubuntu linux 14.04

canonical ubuntu linux 18.04

Vendor Advisories

Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
A memory corruption issue was found in the Linux kernel with a JFS file system Two setxattr calls to the same file with different extended attribute names would trigger an overflow and a memory corruption ...

Github Repositories

MoonShine: Seed Selection for OS Fuzzers (USENIX '18) MoonShine selects compact and diverse seeds for OS fuzzers from system call traces of real world programs Please see our USENIX'18 paper MoonShine: Optimizing OS Fuzzer Seed Selection with Trace Distillation for more details Currently, MoonShine can only generate seeds for Syzkaller on Linux Contents Getting St