Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <26fd3ab9-bc82-6180-2b93-9eed6308fd0d@oracle.com>
Date: Fri, 3 Feb 2017 11:29:20 +0000
From: John Haxby <john.haxby@...cle.com>
To: oss-security@...ts.openwall.com
Subject: Re: Local DoS: Linux Kernel EXT4 Memory Corruption /
 SLAB-Out-of-Bounds Read

On 03/02/17 05:52, Wade Mealing wrote:
> Mounting a crafted EXT4 image read-only leads to a memory corruption and
> SLAB-Out-of-Bounds Reads (according to KASAN).  Since the mounting
> procedure is a privileged operation, an attacker is probably not able
> to trigger this vulnerability on the commandline.
> Instead the automatic mounting feature of the GUI via a crafted
> USB-device is required.
> 
> From full disclosure at:
> 
> http://seclists.org/fulldisclosure/2016/Nov/75
> 
> If it has been assigned elsewhere, I am unable to see it.

The bugzilla link from the above isn't accessible.  Are we missing any
useful information?


jch

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.