CVE-2016-10208

MEDIUM

Linux Kernel < 4.9.8 - Out-of-Bounds Read

Title source: rule
STIX 2.1

Description

The ext4_fill_super function in fs/ext4/super.c in the Linux kernel through 4.9.8 does not properly validate meta block groups, which allows physically proximate attackers to cause a denial of service (out-of-bounds read and system crash) via a crafted ext4 image.

References (11)

Core 11
Core References
Mailing List, Patch, Third Party Advisory mailing-list x_refsource_mlist
http://www.openwall.com/lists/oss-security/2017/02/05/3
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/94354
Vendor Advisory vendor-advisory x_refsource_redhat
https://access.redhat.com/errata/RHSA-2017:1308
Mailing List mailing-list x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
Issue Tracking, Patch, Third Party Advisory x_refsource_confirm
https://github.com/torvalds/linux/commit/3a4b77cd47bb837b8557595ec7425f281f2ca1fe
Vendor Advisory vendor-advisory x_refsource_ubuntu
https://usn.ubuntu.com/3754-1/
Issue Tracking, Patch x_refsource_confirm
https://bugzilla.redhat.com/show_bug.cgi?id=1395190
Vendor Advisory vendor-advisory x_refsource_redhat
https://access.redhat.com/errata/RHSA-2017:1298
Mailing List, Third Party Advisory mailing-list x_refsource_fulldisc
http://seclists.org/fulldisclosure/2016/Nov/75
Vendor Advisory vendor-advisory x_refsource_redhat
https://access.redhat.com/errata/RHSA-2017:1297

Scores

CVSS v3 4.3
EPSS 0.0005
EPSS Percentile 16.5%
Attack Vector PHYSICAL
CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Details

CWE
CWE-125
Status published
Products (1)
linux/linux_kernel < 4.9.8
Published Feb 06, 2017
Tracked Since Feb 18, 2026