CVE-2018-13093
kernel: NULL pointer dereference in lookup_slow function
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
An issue was discovered in fs/xfs/xfs_icache.c in the Linux kernel through 4.17.3. There is a NULL pointer dereference and panic in lookup_slow() on a NULL inode->i_ops pointer when doing pathwalks on a corrupted xfs image. This occurs because of a lack of proper validation that cached inodes are free during allocation.
Se ha descubierto un problema en fs/xfs/xfs_icache.c en el kernel de Linux hasta la versión 4.17.3. Existe una desreferencia de puntero NULL y pánico en lookup_slow() en un puntero NULL inode->i_ops cuando se navega por rutas en una imagen xfs corrupta. Esto ocurre a causa de la ausencia de una validación correcta de que los inodes en caché estén libres durante la asignación.
An issue was discovered in the XFS filesystem in fs/xfs/xfs_icache.c in the Linux kernel. There is a NULL pointer dereference leading to a system panic in lookup_slow() on a NULL inode->i_ops pointer when doing pathwalks on a corrupted xfs image. This occurs because of a lack of proper validation that cached inodes are free during an allocation.
It was discovered that the LIO SCSI target implementation in the Linux kernel performed insufficient identifier checking in certain XCOPY requests. An attacker with access to at least one LUN in a multiple backstore environment could use this to expose sensitive information or modify data. Wen Xu discovered that the XFS filesystem implementation in the Linux kernel did not properly track inode validations. An attacker could use this to construct a malicious XFS image that, when mounted, could cause a denial of service. Various other issues were also addressed.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2018-07-03 CVE Reserved
- 2018-07-03 CVE Published
- 2024-08-05 CVE Updated
- 2025-04-18 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-476: NULL Pointer Dereference
CAPEC
References (10)
URL | Tag | Source |
---|---|---|
https://bugzilla.kernel.org/show_bug.cgi?id=199367 | Issue Tracking | |
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html | Mailing List |
|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://access.redhat.com/errata/RHSA-2019:2029 | 2019-08-06 | |
https://access.redhat.com/errata/RHSA-2019:2043 | 2019-08-06 | |
https://usn.ubuntu.com/4094-1 | 2019-08-06 | |
https://usn.ubuntu.com/4118-1 | 2019-08-06 | |
https://access.redhat.com/security/cve/CVE-2018-13093 | 2019-08-07 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1597766 | 2019-08-07 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | <= 4.17.3 Search vendor "Linux" for product "Linux Kernel" and version " <= 4.17.3" | - |
Affected
|