Lucene search

K
cve[email protected]CVE-2011-4086
HistoryJul 03, 2012 - 4:40 p.m.

CVE-2011-4086

2012-07-0316:40:31
CWE-119
web.nvd.nist.gov
66
cve-2011-4086
linux kernel
denial of service
nvd
vulnerability
ext4
filesystem
local users

4.9 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:N/I:N/A:C

6 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%

The journal_unmap_buffer function in fs/jbd2/transaction.c in the Linux kernel before 3.3.1 does not properly handle the _Delay and _Unwritten buffer head states, which allows local users to cause a denial of service (system crash) by leveraging the presence of an ext4 filesystem that was mounted with a journal.

Affected configurations

NVD
Node
linuxlinux_kernelRange3.3
OR
linuxlinux_kernelMatch3.0rc1
OR
linuxlinux_kernelMatch3.0rc2
OR
linuxlinux_kernelMatch3.0rc3
OR
linuxlinux_kernelMatch3.0rc4
OR
linuxlinux_kernelMatch3.0rc5
OR
linuxlinux_kernelMatch3.0rc6
OR
linuxlinux_kernelMatch3.0rc7
OR
linuxlinux_kernelMatch3.0.1
OR
linuxlinux_kernelMatch3.0.2
OR
linuxlinux_kernelMatch3.0.3
OR
linuxlinux_kernelMatch3.0.4
OR
linuxlinux_kernelMatch3.0.5
OR
linuxlinux_kernelMatch3.0.6
OR
linuxlinux_kernelMatch3.0.7
OR
linuxlinux_kernelMatch3.0.8
OR
linuxlinux_kernelMatch3.0.9
OR
linuxlinux_kernelMatch3.0.10
OR
linuxlinux_kernelMatch3.0.11
OR
linuxlinux_kernelMatch3.0.12
OR
linuxlinux_kernelMatch3.0.13
OR
linuxlinux_kernelMatch3.0.14
OR
linuxlinux_kernelMatch3.0.15
OR
linuxlinux_kernelMatch3.0.16
OR
linuxlinux_kernelMatch3.0.17
OR
linuxlinux_kernelMatch3.0.18
OR
linuxlinux_kernelMatch3.0.19
OR
linuxlinux_kernelMatch3.0.20
OR
linuxlinux_kernelMatch3.0.21
OR
linuxlinux_kernelMatch3.0.22
OR
linuxlinux_kernelMatch3.0.23
OR
linuxlinux_kernelMatch3.0.24
OR
linuxlinux_kernelMatch3.0.25
OR
linuxlinux_kernelMatch3.0.26
OR
linuxlinux_kernelMatch3.0.27
OR
linuxlinux_kernelMatch3.0.28
OR
linuxlinux_kernelMatch3.0.29
OR
linuxlinux_kernelMatch3.0.30
OR
linuxlinux_kernelMatch3.0.31
OR
linuxlinux_kernelMatch3.0.32
OR
linuxlinux_kernelMatch3.0.33
OR
linuxlinux_kernelMatch3.0.34
OR
linuxlinux_kernelMatch3.1
OR
linuxlinux_kernelMatch3.1rc1
OR
linuxlinux_kernelMatch3.1rc2
OR
linuxlinux_kernelMatch3.1rc3
OR
linuxlinux_kernelMatch3.1rc4
OR
linuxlinux_kernelMatch3.1.1
OR
linuxlinux_kernelMatch3.1.2
OR
linuxlinux_kernelMatch3.1.3
OR
linuxlinux_kernelMatch3.1.4
OR
linuxlinux_kernelMatch3.1.5
OR
linuxlinux_kernelMatch3.1.6
OR
linuxlinux_kernelMatch3.1.7
OR
linuxlinux_kernelMatch3.1.8
OR
linuxlinux_kernelMatch3.1.9
OR
linuxlinux_kernelMatch3.1.10
OR
linuxlinux_kernelMatch3.2
OR
linuxlinux_kernelMatch3.2rc2
OR
linuxlinux_kernelMatch3.2rc3
OR
linuxlinux_kernelMatch3.2rc4
OR
linuxlinux_kernelMatch3.2rc5
OR
linuxlinux_kernelMatch3.2rc6
OR
linuxlinux_kernelMatch3.2rc7
OR
linuxlinux_kernelMatch3.2.1
OR
linuxlinux_kernelMatch3.2.2
OR
linuxlinux_kernelMatch3.2.3
OR
linuxlinux_kernelMatch3.2.4
OR
linuxlinux_kernelMatch3.2.5
OR
linuxlinux_kernelMatch3.2.6
OR
linuxlinux_kernelMatch3.2.7
OR
linuxlinux_kernelMatch3.2.8
OR
linuxlinux_kernelMatch3.2.9
OR
linuxlinux_kernelMatch3.2.10
OR
linuxlinux_kernelMatch3.2.11
OR
linuxlinux_kernelMatch3.2.12
OR
linuxlinux_kernelMatch3.2.13
OR
linuxlinux_kernelMatch3.2.14
OR
linuxlinux_kernelMatch3.2.15
OR
linuxlinux_kernelMatch3.2.16
OR
linuxlinux_kernelMatch3.2.17
OR
linuxlinux_kernelMatch3.2.18
OR
linuxlinux_kernelMatch3.2.19
OR
linuxlinux_kernelMatch3.2.20

4.9 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:N/I:N/A:C

6 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%