Vulnerability Description
The ext4_fill_super function in fs/ext4/super.c in the Linux kernel before 2.6.39 does not properly initialize a certain error-report data structure, which allows local users to cause a denial of service (OOPS) by attempting to mount a crafted ext4 filesystem.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | <= 2.6.38.8 |
References
- http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=
- http://www.openwall.com/lists/oss-security/2011/06/24/4
- https://github.com/torvalds/linux/commit/0449641130f5652b344ef6fa39fa019d7e94660ExploitPatch
- http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=
- http://www.openwall.com/lists/oss-security/2011/06/24/4
- https://github.com/torvalds/linux/commit/0449641130f5652b344ef6fa39fa019d7e94660ExploitPatch
FAQ
What is CVE-2011-2493?
CVE-2011-2493 is a vulnerability with a CVSS score of 2.1 (LOW). The ext4_fill_super function in fs/ext4/super.c in the Linux kernel before 2.6.39 does not properly initialize a certain error-report data structure, which allows local users to cause a denial of serv...
How severe is CVE-2011-2493?
CVE-2011-2493 has been rated LOW with a CVSS base score of 2.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-2493?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.