{"id":"CVE-2018-1094","details":"The ext4_fill_super function in fs/ext4/super.c in the Linux kernel through 4.15.15 does not always initialize the crc32c checksum driver, which allows attackers to cause a denial of service (ext4_xattr_inode_hash NULL pointer dereference and system crash) via a crafted ext4 image.","modified":"2026-03-10T14:31:42.199613Z","published":"2018-04-02T03:29:00.370Z","related":["MGASA-2018-0249","MGASA-2018-0264","MGASA-2018-0265","SUSE-SU-2018:1761-1","SUSE-SU-2018:1762-1","SUSE-SU-2018:1816-1","SUSE-SU-2018:1855-1","SUSE-SU-2018:1855-2","SUSE-SU-2018:2092-1"],"references":[{"type":"WEB"},{"type":"ADVISORY","url":"http://openwall.com/lists/oss-security/2018/03/29/1"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:2948"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:3096"},{"type":"ADVISORY","url":"https://git.kernel.org/pub/scm/linux/kernel/git/tytso/ext4.git/commit/?id=18db4b4e6fc31eda838dd1c1296d67dbcb3dc957"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3695-1/"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:3083"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3695-2/"},{"type":"REPORT","url":"https://bugzilla.kernel.org/show_bug.cgi?id=199183"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1560788"},{"type":"FIX","url":"https://git.kernel.org/pub/scm/linux/kernel/git/tytso/ext4.git/commit/?id=a45403b51582a87872927a3e0fc0a389c26867f1"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"4.15.15"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.04"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-1094.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}