The ext4_fill_super function in fs/ext4/super.c in the Linux kernel through 4.15.15 does not always initialize the crc32c checksum driver, which allows attackers to cause a denial of service (ext4_xattr_inode_hash NULL pointer dereference and system crash) via a crafted ext4 image.
References
Link | Resource |
---|---|
https://git.kernel.org/pub/scm/linux/kernel/git/tytso/ext4.git/commit/?id=a45403b51582a87872927a3e0fc0a389c26867f1 | Patch |
https://git.kernel.org/pub/scm/linux/kernel/git/tytso/ext4.git/commit/?id=18db4b4e6fc31eda838dd1c1296d67dbcb3dc957 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1560788 | Issue Tracking Third Party Advisory |
https://bugzilla.kernel.org/show_bug.cgi?id=199183 | Exploit Issue Tracking |
http://openwall.com/lists/oss-security/2018/03/29/1 | Mailing List Third Party Advisory |
https://usn.ubuntu.com/3695-2/ | Third Party Advisory |
https://usn.ubuntu.com/3695-1/ | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2018:3096 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2018:3083 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2018:2948 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2018-04-01 20:29
Updated : 2023-02-12 20:53
NVD link : CVE-2018-1094
Mitre link : CVE-2018-1094
JSON object : View
CWE
CWE-476
NULL Pointer Dereference
Products Affected
redhat
- enterprise_linux_desktop
- enterprise_linux_workstation
- enterprise_linux_server
canonical
- ubuntu_linux
linux
- linux_kernel