vulnerability
Ubuntu: (Multiple Advisories) (CVE-2018-1092): Linux kernel vulnerabilities
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:N/AC:M/Au:N/C:N/I:N/A:C) | Apr 1, 2018 | Jun 13, 2018 | Jan 23, 2025 |
Severity
7
CVSS
(AV:N/AC:M/Au:N/C:N/I:N/A:C)
Published
Apr 1, 2018
Added
Jun 13, 2018
Modified
Jan 23, 2025
Description
The ext4_iget function in fs/ext4/inode.c in the Linux kernel through 4.15.15 mishandles the case of a root directory with a zero i_links_count, which allows attackers to cause a denial of service (ext4_process_freed_data NULL pointer dereference and OOPS) via a crafted ext4 image.
Solution(s)
ubuntu-upgrade-linux-image-3-13-0-157-genericubuntu-upgrade-linux-image-3-13-0-157-generic-lpaeubuntu-upgrade-linux-image-3-13-0-157-lowlatencyubuntu-upgrade-linux-image-3-13-0-157-powerpc-e500ubuntu-upgrade-linux-image-3-13-0-157-powerpc-e500mcubuntu-upgrade-linux-image-3-13-0-157-powerpc-smpubuntu-upgrade-linux-image-3-13-0-157-powerpc64-embubuntu-upgrade-linux-image-3-13-0-157-powerpc64-smpubuntu-upgrade-linux-image-4-13-0-1019-gcpubuntu-upgrade-linux-image-4-13-0-1022-raspi2ubuntu-upgrade-linux-image-4-13-0-1030-oemubuntu-upgrade-linux-image-4-13-0-45-genericubuntu-upgrade-linux-image-4-13-0-45-generic-lpaeubuntu-upgrade-linux-image-4-13-0-45-lowlatencyubuntu-upgrade-linux-image-4-15-0-1009-gcpubuntu-upgrade-linux-image-4-15-0-1010-awsubuntu-upgrade-linux-image-4-15-0-1011-kvmubuntu-upgrade-linux-image-4-15-0-1012-raspi2ubuntu-upgrade-linux-image-4-15-0-1013-azureubuntu-upgrade-linux-image-4-15-0-23-genericubuntu-upgrade-linux-image-4-15-0-23-generic-lpaeubuntu-upgrade-linux-image-4-15-0-23-lowlatencyubuntu-upgrade-linux-image-4-15-0-23-snapdragonubuntu-upgrade-linux-image-4-4-0-1023-awsubuntu-upgrade-linux-image-4-4-0-1027-kvmubuntu-upgrade-linux-image-4-4-0-1061-awsubuntu-upgrade-linux-image-4-4-0-1091-raspi2ubuntu-upgrade-linux-image-4-4-0-1094-snapdragonubuntu-upgrade-linux-image-4-4-0-128-genericubuntu-upgrade-linux-image-4-4-0-128-generic-lpaeubuntu-upgrade-linux-image-4-4-0-128-lowlatencyubuntu-upgrade-linux-image-4-4-0-128-powerpc-e500mcubuntu-upgrade-linux-image-4-4-0-128-powerpc-smpubuntu-upgrade-linux-image-4-4-0-128-powerpc64-embubuntu-upgrade-linux-image-4-4-0-128-powerpc64-smpubuntu-upgrade-linux-image-awsubuntu-upgrade-linux-image-azureubuntu-upgrade-linux-image-gcpubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-hwe-16-04ubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-generic-lpae-hwe-16-04ubuntu-upgrade-linux-image-generic-lpae-lts-xenialubuntu-upgrade-linux-image-generic-lts-xenialubuntu-upgrade-linux-image-gkeubuntu-upgrade-linux-image-kvmubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-lowlatency-hwe-16-04ubuntu-upgrade-linux-image-lowlatency-lts-xenialubuntu-upgrade-linux-image-oemubuntu-upgrade-linux-image-powerpc-e500ubuntu-upgrade-linux-image-powerpc-e500mcubuntu-upgrade-linux-image-powerpc-e500mc-lts-xenialubuntu-upgrade-linux-image-powerpc-smpubuntu-upgrade-linux-image-powerpc-smp-lts-xenialubuntu-upgrade-linux-image-powerpc64-embubuntu-upgrade-linux-image-powerpc64-emb-lts-xenialubuntu-upgrade-linux-image-powerpc64-smpubuntu-upgrade-linux-image-powerpc64-smp-lts-xenialubuntu-upgrade-linux-image-raspi2ubuntu-upgrade-linux-image-snapdragon
References
- CVE-2018-1092
- https://attackerkb.com/topics/CVE-2018-1092
- DEBIAN-DSA-4187
- DEBIAN-DSA-4188
- NVD-CVE-2018-1092
- UBUNTU-USN-3208-1
- UBUNTU-USN-3208-2
- UBUNTU-USN-3234-1
- UBUNTU-USN-3234-2
- UBUNTU-USN-3265-1
- UBUNTU-USN-3265-2
- UBUNTU-USN-3312-1
- UBUNTU-USN-3312-2
- UBUNTU-USN-3314-1
- UBUNTU-USN-3361-1
- UBUNTU-USN-3420-1
- UBUNTU-USN-3420-2
- UBUNTU-USN-3469-1
- UBUNTU-USN-3469-2
- UBUNTU-USN-3485-1
- UBUNTU-USN-3485-2
- UBUNTU-USN-3485-3
- UBUNTU-USN-3487-1
- UBUNTU-USN-3507-1
- UBUNTU-USN-3509-1
- UBUNTU-USN-3509-2
- UBUNTU-USN-3617-1
- UBUNTU-USN-3617-2
- UBUNTU-USN-3617-3
- UBUNTU-USN-3619-1
- UBUNTU-USN-3619-2
- UBUNTU-USN-3631-1
- UBUNTU-USN-3631-2
- UBUNTU-USN-3676-1
- UBUNTU-USN-3676-2
- UBUNTU-USN-3677-1
- UBUNTU-USN-3677-2
- UBUNTU-USN-3678-1
- UBUNTU-USN-3678-2
- UBUNTU-USN-3678-3
- UBUNTU-USN-3678-4
- UBUNTU-USN-3695-1
- UBUNTU-USN-3695-2
- UBUNTU-USN-3696-1
- UBUNTU-USN-3696-2
- UBUNTU-USN-3752-1
- UBUNTU-USN-3752-2
- UBUNTU-USN-3752-3
- UBUNTU-USN-3753-1
- UBUNTU-USN-3753-2
- UBUNTU-USN-3754-1
- UBUNTU-USN-3871-1
- UBUNTU-USN-3871-3
- UBUNTU-USN-3871-4
- UBUNTU-USN-3871-5
- UBUNTU-USN-4486-1
- UBUNTU-USN-4904-1

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.