Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

CVE ID:CVE-2018-1092
Description:The ext4_iget function in fs/ext4/inode.c in the Linux kernel through 4.15.15 mishandles the case of a root directory with a zero i_links_count, which allows attackers to cause a denial of service (ext4_process_freed_data NULL pointer dereference and OOPS) via a crafted ext4 image.
Test IDs: None available
Cross References: Common Vulnerability Exposure (CVE) ID: CVE-2018-1092
DSA-4187
https://www.debian.org/security/2018/dsa-4187
DSA-4188
https://www.debian.org/security/2018/dsa-4188
RHSA-2018:2948
https://access.redhat.com/errata/RHSA-2018:2948
RHSA-2018:3083
https://access.redhat.com/errata/RHSA-2018:3083
RHSA-2018:3096
https://access.redhat.com/errata/RHSA-2018:3096
USN-3676-1
https://usn.ubuntu.com/3676-1/
USN-3676-2
https://usn.ubuntu.com/3676-2/
USN-3677-1
https://usn.ubuntu.com/3677-1/
USN-3677-2
https://usn.ubuntu.com/3677-2/
USN-3678-1
https://usn.ubuntu.com/3678-1/
USN-3678-2
https://usn.ubuntu.com/3678-2/
USN-3678-3
https://usn.ubuntu.com/3678-3/
USN-3678-4
https://usn.ubuntu.com/3678-4/
USN-3754-1
https://usn.ubuntu.com/3754-1/
[debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update
https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
http://openwall.com/lists/oss-security/2018/03/29/1
http://openwall.com/lists/oss-security/2018/03/29/1
https://bugzilla.kernel.org/show_bug.cgi?id=199179
https://bugzilla.kernel.org/show_bug.cgi?id=199179
https://bugzilla.kernel.org/show_bug.cgi?id=199275
https://bugzilla.kernel.org/show_bug.cgi?id=199275
https://bugzilla.redhat.com/show_bug.cgi?id=1560777
https://bugzilla.redhat.com/show_bug.cgi?id=1560777
https://git.kernel.org/pub/scm/linux/kernel/git/tytso/ext4.git/commit/?id=8e4b5eae5decd9dfe5a4ee369c22028f90ab4c44
https://git.kernel.org/pub/scm/linux/kernel/git/tytso/ext4.git/commit/?id=8e4b5eae5decd9dfe5a4ee369c22028f90ab4c44




© 1998-2025 E-Soft Inc. All rights reserved.