CVE-2009-0748
27.02.2009, 17:30
The ext4_fill_super function in fs/ext4/super.c in the Linux kernel 2.6.27 before 2.6.27.19 and 2.6.28 before 2.6.28.7 does not validate the superblock configuration, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) by attempting to mount a crafted ext4 filesystem.Enginsight
Vendor | Product | Version |
---|---|---|
linux | linux_kernel | 2.6.27 |
linux | linux_kernel | 2.6.27:rc1 |
linux | linux_kernel | 2.6.27:rc2 |
linux | linux_kernel | 2.6.27:rc3 |
linux | linux_kernel | 2.6.27:rc4 |
linux | linux_kernel | 2.6.27:rc5 |
linux | linux_kernel | 2.6.27:rc6 |
linux | linux_kernel | 2.6.27:rc7 |
linux | linux_kernel | 2.6.27:rc8 |
linux | linux_kernel | 2.6.27:rc9 |
linux | linux_kernel | 2.6.27.1 |
linux | linux_kernel | 2.6.27.2 |
linux | linux_kernel | 2.6.27.3 |
linux | linux_kernel | 2.6.27.4 |
linux | linux_kernel | 2.6.27.5 |
linux | linux_kernel | 2.6.27.6 |
linux | linux_kernel | 2.6.27.7 |
linux | linux_kernel | 2.6.27.8 |
linux | linux_kernel | 2.6.27.9 |
linux | linux_kernel | 2.6.27.10 |
linux | linux_kernel | 2.6.27.11 |
linux | linux_kernel | 2.6.27.12 |
linux | linux_kernel | 2.6.27.13 |
linux | linux_kernel | 2.6.27.14 |
linux | linux_kernel | 2.6.27.15 |
linux | linux_kernel | 2.6.27.16 |
linux | linux_kernel | 2.6.27.17 |
linux | linux_kernel | 2.6.27.18 |
linux | linux_kernel | 2.6.28 |
linux | linux_kernel | 2.6.28:rc1 |
linux | linux_kernel | 2.6.28:rc2 |
linux | linux_kernel | 2.6.28:rc3 |
linux | linux_kernel | 2.6.28:rc4 |
linux | linux_kernel | 2.6.28:rc5 |
linux | linux_kernel | 2.6.28:rc6 |
linux | linux_kernel | 2.6.28:rc7 |
linux | linux_kernel | 2.6.28.1 |
linux | linux_kernel | 2.6.28.2 |
linux | linux_kernel | 2.6.28.3 |
linux | linux_kernel | 2.6.28.4 |
linux | linux_kernel | 2.6.28.5 |
linux | linux_kernel | 2.6.28.6 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Common Weakness Enumeration
References