CVE-2018-1092

The ext4_iget function in fs/ext4/inode.c in the Linux kernel through 4.15.15 mishandles the case of a root directory with a zero i_links_count, which allows attackers to cause a denial of service (ext4_process_freed_data NULL pointer dereference and OOPS) via a crafted ext4 image.
References
Link Resource
http://openwall.com/lists/oss-security/2018/03/29/1 Mailing List Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2948
https://access.redhat.com/errata/RHSA-2018:3083
https://access.redhat.com/errata/RHSA-2018:3096
https://bugzilla.kernel.org/show_bug.cgi?id=199179 Issue Tracking
https://bugzilla.kernel.org/show_bug.cgi?id=199275 Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=1560777 Issue Tracking Third Party Advisory
https://git.kernel.org/pub/scm/linux/kernel/git/tytso/ext4.git/commit/?id=8e4b5eae5decd9dfe5a4ee369c22028f90ab4c44 Patch
https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
https://usn.ubuntu.com/3676-1/
https://usn.ubuntu.com/3676-2/
https://usn.ubuntu.com/3677-1/
https://usn.ubuntu.com/3677-2/
https://usn.ubuntu.com/3678-1/
https://usn.ubuntu.com/3678-2/
https://usn.ubuntu.com/3678-3/
https://usn.ubuntu.com/3678-4/
https://usn.ubuntu.com/3754-1/
https://www.debian.org/security/2018/dsa-4187
https://www.debian.org/security/2018/dsa-4188
http://openwall.com/lists/oss-security/2018/03/29/1 Mailing List Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2948
https://access.redhat.com/errata/RHSA-2018:3083
https://access.redhat.com/errata/RHSA-2018:3096
https://bugzilla.kernel.org/show_bug.cgi?id=199179 Issue Tracking
https://bugzilla.kernel.org/show_bug.cgi?id=199275 Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=1560777 Issue Tracking Third Party Advisory
https://git.kernel.org/pub/scm/linux/kernel/git/tytso/ext4.git/commit/?id=8e4b5eae5decd9dfe5a4ee369c22028f90ab4c44 Patch
https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
https://usn.ubuntu.com/3676-1/
https://usn.ubuntu.com/3676-2/
https://usn.ubuntu.com/3677-1/
https://usn.ubuntu.com/3677-2/
https://usn.ubuntu.com/3678-1/
https://usn.ubuntu.com/3678-2/
https://usn.ubuntu.com/3678-3/
https://usn.ubuntu.com/3678-4/
https://usn.ubuntu.com/3754-1/
https://www.debian.org/security/2018/dsa-4187
https://www.debian.org/security/2018/dsa-4188
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:59

Type Values Removed Values Added
References () http://openwall.com/lists/oss-security/2018/03/29/1 - Mailing List, Third Party Advisory () http://openwall.com/lists/oss-security/2018/03/29/1 - Mailing List, Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:2948 - () https://access.redhat.com/errata/RHSA-2018:2948 -
References () https://access.redhat.com/errata/RHSA-2018:3083 - () https://access.redhat.com/errata/RHSA-2018:3083 -
References () https://access.redhat.com/errata/RHSA-2018:3096 - () https://access.redhat.com/errata/RHSA-2018:3096 -
References () https://bugzilla.kernel.org/show_bug.cgi?id=199179 - Issue Tracking () https://bugzilla.kernel.org/show_bug.cgi?id=199179 - Issue Tracking
References () https://bugzilla.kernel.org/show_bug.cgi?id=199275 - Issue Tracking () https://bugzilla.kernel.org/show_bug.cgi?id=199275 - Issue Tracking
References () https://bugzilla.redhat.com/show_bug.cgi?id=1560777 - Issue Tracking, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=1560777 - Issue Tracking, Third Party Advisory
References () https://git.kernel.org/pub/scm/linux/kernel/git/tytso/ext4.git/commit/?id=8e4b5eae5decd9dfe5a4ee369c22028f90ab4c44 - Patch () https://git.kernel.org/pub/scm/linux/kernel/git/tytso/ext4.git/commit/?id=8e4b5eae5decd9dfe5a4ee369c22028f90ab4c44 - Patch
References () https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html - () https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html -
References () https://usn.ubuntu.com/3676-1/ - () https://usn.ubuntu.com/3676-1/ -
References () https://usn.ubuntu.com/3676-2/ - () https://usn.ubuntu.com/3676-2/ -
References () https://usn.ubuntu.com/3677-1/ - () https://usn.ubuntu.com/3677-1/ -
References () https://usn.ubuntu.com/3677-2/ - () https://usn.ubuntu.com/3677-2/ -
References () https://usn.ubuntu.com/3678-1/ - () https://usn.ubuntu.com/3678-1/ -
References () https://usn.ubuntu.com/3678-2/ - () https://usn.ubuntu.com/3678-2/ -
References () https://usn.ubuntu.com/3678-3/ - () https://usn.ubuntu.com/3678-3/ -
References () https://usn.ubuntu.com/3678-4/ - () https://usn.ubuntu.com/3678-4/ -
References () https://usn.ubuntu.com/3754-1/ - () https://usn.ubuntu.com/3754-1/ -
References () https://www.debian.org/security/2018/dsa-4187 - () https://www.debian.org/security/2018/dsa-4187 -
References () https://www.debian.org/security/2018/dsa-4188 - () https://www.debian.org/security/2018/dsa-4188 -

Information

Published : 2018-04-02 03:29

Updated : 2024-11-21 03:59


NVD link : CVE-2018-1092

Mitre link : CVE-2018-1092

CVE.ORG link : CVE-2018-1092


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference