Lucene search

K
cveMitreCVE-2009-0748
HistoryFeb 27, 2009 - 5:30 p.m.

CVE-2009-0748

2009-02-2717:30:09
CWE-20
mitre
web.nvd.nist.gov
58
cve-2009-0748
linux kernel
ext4
denial of service
null pointer dereference
oops

CVSS2

4.9

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:N/I:N/A:C

AI Score

6.7

Confidence

High

EPSS

0

Percentile

10.1%

The ext4_fill_super function in fs/ext4/super.c in the Linux kernel 2.6.27 before 2.6.27.19 and 2.6.28 before 2.6.28.7 does not validate the superblock configuration, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) by attempting to mount a crafted ext4 filesystem.

Affected configurations

Nvd
Node
linuxlinux_kernelMatch2.6.27
OR
linuxlinux_kernelMatch2.6.27rc1
OR
linuxlinux_kernelMatch2.6.27rc2
OR
linuxlinux_kernelMatch2.6.27rc3
OR
linuxlinux_kernelMatch2.6.27rc4
OR
linuxlinux_kernelMatch2.6.27rc5
OR
linuxlinux_kernelMatch2.6.27rc6
OR
linuxlinux_kernelMatch2.6.27rc7
OR
linuxlinux_kernelMatch2.6.27rc8
OR
linuxlinux_kernelMatch2.6.27rc9
OR
linuxlinux_kernelMatch2.6.27.1
OR
linuxlinux_kernelMatch2.6.27.2
OR
linuxlinux_kernelMatch2.6.27.3
OR
linuxlinux_kernelMatch2.6.27.4
OR
linuxlinux_kernelMatch2.6.27.5
OR
linuxlinux_kernelMatch2.6.27.6
OR
linuxlinux_kernelMatch2.6.27.7
OR
linuxlinux_kernelMatch2.6.27.8
OR
linuxlinux_kernelMatch2.6.27.9
OR
linuxlinux_kernelMatch2.6.27.10
OR
linuxlinux_kernelMatch2.6.27.11
OR
linuxlinux_kernelMatch2.6.27.12
OR
linuxlinux_kernelMatch2.6.27.13
OR
linuxlinux_kernelMatch2.6.27.14
OR
linuxlinux_kernelMatch2.6.27.15
OR
linuxlinux_kernelMatch2.6.27.16
OR
linuxlinux_kernelMatch2.6.27.17
OR
linuxlinux_kernelMatch2.6.27.18
OR
linuxlinux_kernelMatch2.6.28
OR
linuxlinux_kernelMatch2.6.28rc1
OR
linuxlinux_kernelMatch2.6.28rc2
OR
linuxlinux_kernelMatch2.6.28rc3
OR
linuxlinux_kernelMatch2.6.28rc4
OR
linuxlinux_kernelMatch2.6.28rc5
OR
linuxlinux_kernelMatch2.6.28rc6
OR
linuxlinux_kernelMatch2.6.28rc7
OR
linuxlinux_kernelMatch2.6.28.1
OR
linuxlinux_kernelMatch2.6.28.2
OR
linuxlinux_kernelMatch2.6.28.3
OR
linuxlinux_kernelMatch2.6.28.4
OR
linuxlinux_kernelMatch2.6.28.5
OR
linuxlinux_kernelMatch2.6.28.6
VendorProductVersionCPE
linuxlinux_kernel2.6.27cpe:2.3:o:linux:linux_kernel:2.6.27:*:*:*:*:*:*:*
linuxlinux_kernel2.6.27cpe:2.3:o:linux:linux_kernel:2.6.27:rc1:*:*:*:*:*:*
linuxlinux_kernel2.6.27cpe:2.3:o:linux:linux_kernel:2.6.27:rc2:*:*:*:*:*:*
linuxlinux_kernel2.6.27cpe:2.3:o:linux:linux_kernel:2.6.27:rc3:*:*:*:*:*:*
linuxlinux_kernel2.6.27cpe:2.3:o:linux:linux_kernel:2.6.27:rc4:*:*:*:*:*:*
linuxlinux_kernel2.6.27cpe:2.3:o:linux:linux_kernel:2.6.27:rc5:*:*:*:*:*:*
linuxlinux_kernel2.6.27cpe:2.3:o:linux:linux_kernel:2.6.27:rc6:*:*:*:*:*:*
linuxlinux_kernel2.6.27cpe:2.3:o:linux:linux_kernel:2.6.27:rc7:*:*:*:*:*:*
linuxlinux_kernel2.6.27cpe:2.3:o:linux:linux_kernel:2.6.27:rc8:*:*:*:*:*:*
linuxlinux_kernel2.6.27cpe:2.3:o:linux:linux_kernel:2.6.27:rc9:*:*:*:*:*:*
Rows per page:
1-10 of 421

References

CVSS2

4.9

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:N/I:N/A:C

AI Score

6.7

Confidence

High

EPSS

0

Percentile

10.1%