Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2009-0748

Опубликовано: 06 янв. 2009
Источник: redhat
CVSS2: 4.9

Описание

The ext4_fill_super function in fs/ext4/super.c in the Linux kernel 2.6.27 before 2.6.27.19 and 2.6.28 before 2.6.28.7 does not validate the superblock configuration, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) by attempting to mount a crafted ext4 filesystem.

Отчет

This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, 4, and Red Hat Enterprise MRG.

Дополнительная информация

Статус:

Low
https://bugzilla.redhat.com/show_bug.cgi?id=487945kernel: ext4: ext4_fill_super() missing validation issue

4.9 Medium

CVSS2

Связанные уязвимости

ubuntu
больше 16 лет назад

The ext4_fill_super function in fs/ext4/super.c in the Linux kernel 2.6.27 before 2.6.27.19 and 2.6.28 before 2.6.28.7 does not validate the superblock configuration, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) by attempting to mount a crafted ext4 filesystem.

nvd
больше 16 лет назад

The ext4_fill_super function in fs/ext4/super.c in the Linux kernel 2.6.27 before 2.6.27.19 and 2.6.28 before 2.6.28.7 does not validate the superblock configuration, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) by attempting to mount a crafted ext4 filesystem.

debian
больше 16 лет назад

The ext4_fill_super function in fs/ext4/super.c in the Linux kernel 2. ...

github
больше 3 лет назад

The ext4_fill_super function in fs/ext4/super.c in the Linux kernel 2.6.27 before 2.6.27.19 and 2.6.28 before 2.6.28.7 does not validate the superblock configuration, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) by attempting to mount a crafted ext4 filesystem.

oracle-oval
около 16 лет назад

ELSA-2009-1243: Oracle Enterprise Linux 5.4 kernel security and bug fix update (IMPORTANT)

4.9 Medium

CVSS2