CVE-2016-10208

The ext4_fill_super function in fs/ext4/super.c in the Linux kernel through 4.9.8 does not properly validate meta block groups, which allows physically proximate attackers to cause a denial of service (out-of-bounds read and system crash) via a crafted ext4 image.
References
Link Resource
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=3a4b77cd47bb837b8557595ec7425f281f2ca1fe Issue Tracking Patch Third Party Advisory
http://seclists.org/fulldisclosure/2016/Nov/75 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2017/02/05/3 Mailing List Patch Third Party Advisory
http://www.securityfocus.com/bid/94354
https://access.redhat.com/errata/RHSA-2017:1297
https://access.redhat.com/errata/RHSA-2017:1298
https://access.redhat.com/errata/RHSA-2017:1308
https://bugzilla.redhat.com/show_bug.cgi?id=1395190 Issue Tracking Patch
https://github.com/torvalds/linux/commit/3a4b77cd47bb837b8557595ec7425f281f2ca1fe Issue Tracking Patch Third Party Advisory
https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
https://usn.ubuntu.com/3754-1/
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=3a4b77cd47bb837b8557595ec7425f281f2ca1fe Issue Tracking Patch Third Party Advisory
http://seclists.org/fulldisclosure/2016/Nov/75 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2017/02/05/3 Mailing List Patch Third Party Advisory
http://www.securityfocus.com/bid/94354
https://access.redhat.com/errata/RHSA-2017:1297
https://access.redhat.com/errata/RHSA-2017:1298
https://access.redhat.com/errata/RHSA-2017:1308
https://bugzilla.redhat.com/show_bug.cgi?id=1395190 Issue Tracking Patch
https://github.com/torvalds/linux/commit/3a4b77cd47bb837b8557595ec7425f281f2ca1fe Issue Tracking Patch Third Party Advisory
https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
https://usn.ubuntu.com/3754-1/
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:43

Type Values Removed Values Added
References () http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=3a4b77cd47bb837b8557595ec7425f281f2ca1fe - Issue Tracking, Patch, Third Party Advisory () http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=3a4b77cd47bb837b8557595ec7425f281f2ca1fe - Issue Tracking, Patch, Third Party Advisory
References () http://seclists.org/fulldisclosure/2016/Nov/75 - Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2016/Nov/75 - Mailing List, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2017/02/05/3 - Mailing List, Patch, Third Party Advisory () http://www.openwall.com/lists/oss-security/2017/02/05/3 - Mailing List, Patch, Third Party Advisory
References () http://www.securityfocus.com/bid/94354 - () http://www.securityfocus.com/bid/94354 -
References () https://access.redhat.com/errata/RHSA-2017:1297 - () https://access.redhat.com/errata/RHSA-2017:1297 -
References () https://access.redhat.com/errata/RHSA-2017:1298 - () https://access.redhat.com/errata/RHSA-2017:1298 -
References () https://access.redhat.com/errata/RHSA-2017:1308 - () https://access.redhat.com/errata/RHSA-2017:1308 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=1395190 - Issue Tracking, Patch () https://bugzilla.redhat.com/show_bug.cgi?id=1395190 - Issue Tracking, Patch
References () https://github.com/torvalds/linux/commit/3a4b77cd47bb837b8557595ec7425f281f2ca1fe - Issue Tracking, Patch, Third Party Advisory () https://github.com/torvalds/linux/commit/3a4b77cd47bb837b8557595ec7425f281f2ca1fe - Issue Tracking, Patch, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html - () https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html -
References () https://usn.ubuntu.com/3754-1/ - () https://usn.ubuntu.com/3754-1/ -

Information

Published : 2017-02-06 06:59

Updated : 2024-11-21 02:43


NVD link : CVE-2016-10208

Mitre link : CVE-2016-10208

CVE.ORG link : CVE-2016-10208


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-125

Out-of-bounds Read