{ "CVE_data_meta" : { "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2018-1095", "STATE" : "PUBLIC" }, "affects" : { "vendor" : { "vendor_data" : [ { "product" : { "product_data" : [ { "product_name" : "Linux kernel through version 4.15", "version" : { "version_data" : [ { "version_value" : "Linux kernel through version 4.15" } ] } } ] }, "vendor_name" : "n/a" } ] } }, "data_format" : "MITRE", "data_type" : "CVE", "data_version" : "4.0", "description" : { "description_data" : [ { "lang" : "eng", "value" : "The ext4_xattr_check_entries function in fs/ext4/xattr.c in the Linux kernel through 4.15.15 does not properly validate xattr sizes, which causes misinterpretation of a size as an error code, and consequently allows attackers to cause a denial of service (get_acl NULL pointer dereference and system crash) via a crafted ext4 image." } ] }, "problemtype" : { "problemtype_data" : [ { "description" : [ { "lang" : "eng", "value" : "NULL pointer dereference" } ] } ] }, "references" : { "reference_data" : [ { "name" : "http://openwall.com/lists/oss-security/2018/03/29/1", "refsource" : "MISC", "url" : "http://openwall.com/lists/oss-security/2018/03/29/1" }, { "name" : "https://bugzilla.kernel.org/show_bug.cgi?id=199185", "refsource" : "MISC", "url" : "https://bugzilla.kernel.org/show_bug.cgi?id=199185" }, { "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1560793", "refsource" : "MISC", "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1560793" }, { "name" : "https://git.kernel.org/pub/scm/linux/kernel/git/tytso/ext4.git/commit/?id=ce3fd194fcc6fbdc00ce095a852f22df97baa401", "refsource" : "MISC", "url" : "https://git.kernel.org/pub/scm/linux/kernel/git/tytso/ext4.git/commit/?id=ce3fd194fcc6fbdc00ce095a852f22df97baa401" }, { "name" : "RHSA-2018:2948", "refsource" : "REDHAT", "url" : "https://access.redhat.com/errata/RHSA-2018:2948" }, { "name" : "USN-3695-1", "refsource" : "UBUNTU", "url" : "https://usn.ubuntu.com/3695-1/" }, { "name" : "USN-3695-2", "refsource" : "UBUNTU", "url" : "https://usn.ubuntu.com/3695-2/" } ] } }