The Linux kernel is vulnerable to a NULL pointer dereference in the ext4/mballoc.c:ext4_process_freed_data() function. An attacker could trick a legitimate user or a privileged attacker could exploit this by mounting a crafted ext4 image to cause a kernel panic.
Find out more about CVE-2018-1092 from the MITRE CVE dictionary dictionary and NIST NVD.
CVSS3 Base Score | 4.6 |
---|---|
CVSS3 Base Metrics | CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
Attack Vector | Physical |
Attack Complexity | Low |
Privileges Required | None |
User Interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity Impact | None |
Availability Impact | High |
Platform | Errata | Release Date |
---|---|---|
Red Hat Enterprise Linux 7 (kernel-alt) | RHSA-2018:2948 | 2018-10-30 |
Red Hat Enterprise Linux for Real Time for NFV (v. 7) (kernel-rt) | RHSA-2018:3096 | 2018-10-30 |
Red Hat Enterprise Linux 7 (kernel) | RHSA-2018:3083 | 2018-10-30 |
Platform | Package | State |
---|---|---|
Red Hat Enterprise MRG 2 | realtime-kernel | Affected |
Red Hat Enterprise Linux 6 | kernel | Affected |
Red Hat Enterprise Linux 5 | kernel | Will not fix |