La funzione ext4_iget in fs / ext4 / inode.c nel kernel Linux attraverso 4.15.15 strapazza il caso di una directory principale con un i_links_count zero, che permette che gli attaccanti causare una negazione di servizio (ext4_process_freed_data puntatore NULL dereference e OOPS) tramite un immagine ext4 artigianale. |
https://www.debian.org/security/2018/dsa-4187 https://www.debian.org/security/2018/dsa-4188 http://openwall.com/lists/oss-security/2018/03/29/1 https://bugzilla.kernel.org/show_bug.cgi?id=199179 https://bugzilla.kernel.org/show_bug.cgi?id=199275 https://bugzilla.redhat.com/show_bug.cgi?id=1560777 https://git.kernel.org/pub/scm/linux/kernel/git/tytso/ext4.git/commit/?id=8e4b5eae5decd9dfe5a4ee369c22028f90ab4c44 https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html https://access.redhat.com/errata/RHSA-2018:2948 https://access.redhat.com/errata/RHSA-2018:3083 https://access.redhat.com/errata/RHSA-2018:3096 https://usn.ubuntu.com/3676-1/ https://usn.ubuntu.com/3676-2/ https://usn.ubuntu.com/3677-1/ https://usn.ubuntu.com/3677-2/ https://usn.ubuntu.com/3678-1/ https://usn.ubuntu.com/3678-2/ https://usn.ubuntu.com/3678-3/ https://usn.ubuntu.com/3678-4/ https://usn.ubuntu.com/3754-1/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092 |
Vulnerabilità: CVE-2018-1092
