{"id":"CVE-2018-1095","details":"The ext4_xattr_check_entries function in fs/ext4/xattr.c in the Linux kernel through 4.15.15 does not properly validate xattr sizes, which causes misinterpretation of a size as an error code, and consequently allows attackers to cause a denial of service (get_acl NULL pointer dereference and system crash) via a crafted ext4 image.","modified":"2026-04-16T06:24:15.974967143Z","published":"2018-04-02T03:29:00.433Z","references":[{"type":"WEB","url":"https://usn.ubuntu.com/3695-2/"},{"type":"WEB","url":"https://usn.ubuntu.com/3695-1/"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:2948"},{"type":"REPORT","url":"https://bugzilla.kernel.org/show_bug.cgi?id=199185"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1560793"},{"type":"FIX","url":"https://git.kernel.org/pub/scm/linux/kernel/git/tytso/ext4.git/commit/?id=ce3fd194fcc6fbdc00ce095a852f22df97baa401"},{"type":"ARTICLE","url":"http://openwall.com/lists/oss-security/2018/03/29/1"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"4.15.15"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-1095.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}