Vulnerability Description
Integer signedness error in the btrfs_ioctl_space_info function in the Linux kernel 2.6.37 allows local users to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted slot value.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | 2.6.37 |
Related Weaknesses (CWE)
References
- http://marc.info/?l=linux-kernel&m=129726078708425&w=2PatchThird Party Advisory
- http://marc.info/?l=oss-security&m=129726743519620&w=2Third Party Advisory
- http://vulnfactory.org/vulns/Third Party Advisory
- https://github.com/BlankOn/linux-debian/blob/master/debian/changelog.BlankOnRelease NotesThird Party Advisory
- http://marc.info/?l=linux-kernel&m=129726078708425&w=2PatchThird Party Advisory
- http://marc.info/?l=oss-security&m=129726743519620&w=2Third Party Advisory
- http://vulnfactory.org/vulns/Third Party Advisory
- https://github.com/BlankOn/linux-debian/blob/master/debian/changelog.BlankOnRelease NotesThird Party Advisory
FAQ
What is CVE-2011-0699?
CVE-2011-0699 is a vulnerability with a CVSS score of 7.0 (HIGH). Integer signedness error in the btrfs_ioctl_space_info function in the Linux kernel 2.6.37 allows local users to cause a denial of service (heap-based buffer overflow) or possibly have unspecified oth...
How severe is CVE-2011-0699?
CVE-2011-0699 has been rated HIGH with a CVSS base score of 7.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-0699?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.