The ext4_iget function in fs/ext4/inode.c in the Linux kernel up to and including 4.15.15 mishandles the case of a root directory with a zero i_links_count, which allows malicious users to cause a denial of service (ext4_process_freed_data NULL pointer dereference and OOPS) via a crafted ext4 image.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
linux linux kernel |