vulnerability
SUSE: CVE-2018-1092: SUSE Linux Security Advisory
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:N/AC:M/Au:N/C:N/I:N/A:C) | Apr 1, 2018 | Jun 21, 2018 | Feb 4, 2022 |
Severity
7
CVSS
(AV:N/AC:M/Au:N/C:N/I:N/A:C)
Published
Apr 1, 2018
Added
Jun 21, 2018
Modified
Feb 4, 2022
Description
The ext4_iget function in fs/ext4/inode.c in the Linux kernel through 4.15.15 mishandles the case of a root directory with a zero i_links_count, which allows attackers to cause a denial of service (ext4_process_freed_data NULL pointer dereference and OOPS) via a crafted ext4 image.
Solution(s)
suse-upgrade-kernel-defaultsuse-upgrade-kernel-ec2suse-upgrade-kernel-ec2-develsuse-upgrade-kernel-ec2-extra
References
- SUSE-SUSE-SU-2018:1761-1
- SUSE-SUSE-SU-2018:1762-1
- SUSE-SUSE-SU-2018:1816-1
- SUSE-SUSE-SU-2018:1855-1
- SUSE-SUSE-SU-2018:1855-2
- SUSE-SUSE-SU-2018:2092-1
- UBUNTU-USN-3676-1
- UBUNTU-USN-3676-2
- UBUNTU-USN-3677-1
- UBUNTU-USN-3677-2
- UBUNTU-USN-3678-1
- UBUNTU-USN-3678-2
- UBUNTU-USN-3678-3
- UBUNTU-USN-3678-4
- UBUNTU-USN-3754-1
- DEBIAN-DSA-4187
- DEBIAN-DSA-4188
- NVD-CVE-2018-1092

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.