Out-of-bounds read in Linux kernel and linux_kernel (Debian package) - CVE-2016-10208
Published: May 23, 2017 / Updated: May 30, 2017
Vulnerability identifier: #VU6644
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2016-10208
CWE-ID: CWE-125
Exploitation vector: Local access
Exploit availability:
No public exploit available
Vendor: Linux Foundation
Debian
Debian
Affected software:
Linux kernel
linux_kernel (Debian package)
Linux kernel
linux_kernel (Debian package)
Detailed vulnerability description
The vulnerability allows a local attacker to cause DoS condition on the target systsem.
The weakness exists due to memory corruption when validating meta block groups by the ext4_fill_super function. A local attacker can use a specially crafted EXT4 image to trigger an out-of-bounds read and cause the system to crash.
Successful exploitation of the vulnerability results in denial of service.
The weakness exists due to memory corruption when validating meta block groups by the ext4_fill_super function. A local attacker can use a specially crafted EXT4 image to trigger an out-of-bounds read and cause the system to crash.
Successful exploitation of the vulnerability results in denial of service.