Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <b44c7133952c41e598c801ee468cf44c@imshyb01.MITRE.ORG>
Date: Sat, 4 Feb 2017 21:35:41 -0500
From: <cve-assign@...re.org>
To: <wmealing@...hat.com>
CC: <cve-assign@...re.org>, <oss-security@...ts.openwall.com>
Subject: Re: Local DoS: Linux Kernel EXT4 Memory Corruption / SLAB-Out-of-Bounds Read

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

> http://seclists.org/fulldisclosure/2016/Nov/75
> https://bugzilla.redhat.com/show_bug.cgi?id=1332503

>> OS-S Security Advisory 2016-22

> I'd like to ask for a CVE for the flaw the EXT4 filesystem as described as:
> 
> Mounting a crafted EXT4 image read-only leads to a memory corruption and
> SLAB-Out-of-Bounds Reads (according to KASAN).  Since the mounting
> procedure is a privileged operation, an attacker is probably not able
> to trigger this vulnerability on the commandline.
> Instead the automatic mounting feature of the GUI via a crafted
> USB-device is required.

> https://bugzilla.suse.com/show_bug.cgi?id=1023377
> 
> https://bugzilla.redhat.com/show_bug.cgi?id=1395190
> http://www.spinics.net/lists/linux-ext4/msg54572.html
> 
> Introduced in:
> https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=952fc18ef9ec707ebdc16c0786ec360295e5ff15
> (first in v3.6-rc1...)
> 
> Fix:
> https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=3a4b77cd47bb837b8557595ec7425f281f2ca1fe
> (first in v4.10-rc1)

Use CVE-2016-10208.

- -- 
CVE Assignment Team
M/S M300, 202 Burlington Road, Bedford, MA 01730 USA
[ A PGP key is available for encrypted communications at
  http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=ZWjb
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.