Files
CVEs-PoC/2018/CVE-2018-1094.md
T
2024-06-18 02:51:15 +02:00

18 lines
863 B
Markdown

### [CVE-2018-1094](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1094)
![](https://img.shields.io/static/v1?label=Product&message=Linux%20kernel%20through%20version%204.15&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20Linux%20kernel%20through%20version%204.15%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=NULL%20pointer%20dereference&color=brighgreen)
### Description
The ext4_fill_super function in fs/ext4/super.c in the Linux kernel through 4.15.15 does not always initialize the crc32c checksum driver, which allows attackers to cause a denial of service (ext4_xattr_inode_hash NULL pointer dereference and system crash) via a crafted ext4 image.
### POC
#### Reference
- https://bugzilla.kernel.org/show_bug.cgi?id=199183
#### Github
No PoCs found on GitHub currently.