CVE-2010-3015
Published: 20 August 2010
Integer overflow in the ext4_ext_get_blocks function in fs/ext4/extents.c in the Linux kernel before 2.6.34 allows local users to cause a denial of service (BUG and system crash) via a write operation on the last block of a large file, followed by a sync operation.
From the Ubuntu security team
Toshiyuki Okajima discovered that ext4 did not correctly check certain parameters. A local attacker could exploit this to crash the system or overwrite the last block of large files.
Priority
Status
Package | Release | Status |
---|---|---|
linux Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
Patches: Hardy: http://chinstrap.ubuntu.com/~sconklin/CVEs/CVE-2010-3015/patches/hardy/linux/0001-ext4-consolidate-in_range-definitions.txt Jaunty: http://chinstrap.ubuntu.com/~sconklin/CVEs/CVE-2010-3015/patches/jaunty/linux/0001-ext4-consolidate-in_range-definitions.txt Karmic: http://chinstrap.ubuntu.com/~sconklin/CVEs/CVE-2010-3015/patches/karmic/linux/0001-ext4-consolidate-in_range-definitions.txt Lucid: http://chinstrap.ubuntu.com/~sconklin/CVEs/CVE-2010-3015/patches/lucid/linux/0001-ext4-consolidate-in_range-definitions.txt |
||
linux-ec2 Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
linux-fsl-imx51 Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
linux-lts-backport-maverick Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
linux-source-2.6.15 Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|