CVE-2018-1094

The ext4_fill_super function in fs/ext4/super.c in the Linux kernel through 4.15.15 does not always initialize the crc32c checksum driver, which allows attackers to cause a denial of service (ext4_xattr_inode_hash NULL pointer dereference and system crash) via a crafted ext4 image.
References
Link Resource
http://openwall.com/lists/oss-security/2018/03/29/1 Mailing List Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2948 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3083 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3096 Third Party Advisory
https://bugzilla.kernel.org/show_bug.cgi?id=199183 Exploit Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=1560788 Issue Tracking Third Party Advisory
https://git.kernel.org/pub/scm/linux/kernel/git/tytso/ext4.git/commit/?id=18db4b4e6fc31eda838dd1c1296d67dbcb3dc957 Third Party Advisory
https://git.kernel.org/pub/scm/linux/kernel/git/tytso/ext4.git/commit/?id=a45403b51582a87872927a3e0fc0a389c26867f1 Patch
https://usn.ubuntu.com/3695-1/ Third Party Advisory
https://usn.ubuntu.com/3695-2/ Third Party Advisory
http://openwall.com/lists/oss-security/2018/03/29/1 Mailing List Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2948 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3083 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3096 Third Party Advisory
https://bugzilla.kernel.org/show_bug.cgi?id=199183 Exploit Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=1560788 Issue Tracking Third Party Advisory
https://git.kernel.org/pub/scm/linux/kernel/git/tytso/ext4.git/commit/?id=18db4b4e6fc31eda838dd1c1296d67dbcb3dc957 Third Party Advisory
https://git.kernel.org/pub/scm/linux/kernel/git/tytso/ext4.git/commit/?id=a45403b51582a87872927a3e0fc0a389c26867f1 Patch
https://usn.ubuntu.com/3695-1/ Third Party Advisory
https://usn.ubuntu.com/3695-2/ Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

History

21 Nov 2024, 03:59

Type Values Removed Values Added
References () http://openwall.com/lists/oss-security/2018/03/29/1 - Mailing List, Third Party Advisory () http://openwall.com/lists/oss-security/2018/03/29/1 - Mailing List, Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:2948 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:2948 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:3083 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:3083 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:3096 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:3096 - Third Party Advisory
References () https://bugzilla.kernel.org/show_bug.cgi?id=199183 - Exploit, Issue Tracking () https://bugzilla.kernel.org/show_bug.cgi?id=199183 - Exploit, Issue Tracking
References () https://bugzilla.redhat.com/show_bug.cgi?id=1560788 - Issue Tracking, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=1560788 - Issue Tracking, Third Party Advisory
References () https://git.kernel.org/pub/scm/linux/kernel/git/tytso/ext4.git/commit/?id=18db4b4e6fc31eda838dd1c1296d67dbcb3dc957 - Third Party Advisory () https://git.kernel.org/pub/scm/linux/kernel/git/tytso/ext4.git/commit/?id=18db4b4e6fc31eda838dd1c1296d67dbcb3dc957 - Third Party Advisory
References () https://git.kernel.org/pub/scm/linux/kernel/git/tytso/ext4.git/commit/?id=a45403b51582a87872927a3e0fc0a389c26867f1 - Patch () https://git.kernel.org/pub/scm/linux/kernel/git/tytso/ext4.git/commit/?id=a45403b51582a87872927a3e0fc0a389c26867f1 - Patch
References () https://usn.ubuntu.com/3695-1/ - Third Party Advisory () https://usn.ubuntu.com/3695-1/ - Third Party Advisory
References () https://usn.ubuntu.com/3695-2/ - Third Party Advisory () https://usn.ubuntu.com/3695-2/ - Third Party Advisory

Information

Published : 2018-04-02 03:29

Updated : 2024-11-21 03:59


NVD link : CVE-2018-1094

Mitre link : CVE-2018-1094

CVE.ORG link : CVE-2018-1094


JSON object : View

Products Affected

linux

  • linux_kernel

canonical

  • ubuntu_linux

redhat

  • enterprise_linux_desktop
  • enterprise_linux_workstation
  • enterprise_linux_server
CWE
CWE-476

NULL Pointer Dereference