5.5
CVSSv3

CVE-2018-1095

Published: 02/04/2018 Updated: 13/02/2023
CVSS v2 Base Score: 7.1 | Impact Score: 6.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 632
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:C

Vulnerability Summary

The ext4_xattr_check_entries function in fs/ext4/xattr.c in the Linux kernel up to and including 4.15.15 does not properly validate xattr sizes, which causes misinterpretation of a size as an error code, and consequently allows malicious users to cause a denial of service (get_acl NULL pointer dereference and system crash) via a crafted ext4 image.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

Vendor Advisories

Synopsis Important: kernel-alt security, bug fix, and enhancement update Type/Severity Security Advisory: Important Topic An update for kernel-alt is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability S ...
A regression that caused boot failures was fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
A regression that caused boot failures was fixed in the Linux kernel ...
The Linux kernel is vulnerable to an out-of-bound access bug in the fs/posix_aclc:get_acl() function An attacker could trick a legitimate user or a privileged attacker could exploit this to cause a system crash or other unspecified impact with a crafted ext4 image Due to the nature of the flaw, privilege escalation cannot be fully ruled out, alt ...