Integer signedness error in the btrfs_ioctl_space_info function in the Linux kernel 2.6.37 allows local users to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted slot value.
References
Link | Resource |
---|---|
http://marc.info/?l=linux-kernel&m=129726078708425&w=2 | Patch Third Party Advisory |
http://marc.info/?l=oss-security&m=129726743519620&w=2 | Third Party Advisory |
http://vulnfactory.org/vulns/ | Third Party Advisory |
https://github.com/BlankOn/linux-debian/blob/master/debian/changelog.BlankOn | Release Notes Third Party Advisory |
http://marc.info/?l=linux-kernel&m=129726078708425&w=2 | Patch Third Party Advisory |
http://marc.info/?l=oss-security&m=129726743519620&w=2 | Third Party Advisory |
http://vulnfactory.org/vulns/ | Third Party Advisory |
https://github.com/BlankOn/linux-debian/blob/master/debian/changelog.BlankOn | Release Notes Third Party Advisory |
Configurations
History
No history.
Information
Published : 2020-02-20 18:15
Updated : 2024-11-21 01:24
NVD link : CVE-2011-0699
Mitre link : CVE-2011-0699
CVE.ORG link : CVE-2011-0699
JSON object : View
Products Affected
linux
- linux_kernel