Integer overflow in the btrfs_ioctl_clone function in fs/btrfs/ioctl.c in the Linux kernel before 2.6.35 might allow local users to obtain sensitive information via a BTRFS_IOC_CLONE_RANGE ioctl call.
Version | Base score | Base severity | Vector |
---|
Hyperlink | Resource Type |
---|
Integer overflow in the btrfs_ioctl_clone function in fs/btrfs/ioctl.c in the Linux kernel before 2.6.35 might allow local users to obtain sensitive information via a BTRFS_IOC_CLONE_RANGE ioctl call.
Type | CWE ID | Description |
---|---|---|
text | N/A | n/a |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://www.securityfocus.com/bid/41854 | vdb-entry x_refsource_BID |
http://www.ubuntu.com/usn/USN-1041-1 | vendor-advisory x_refsource_UBUNTU |
http://www.openwall.com/lists/oss-security/2010/07/21/10 | mailing-list x_refsource_MLIST |
http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00004.html | vendor-advisory x_refsource_SUSE |
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35 | x_refsource_CONFIRM |
http://secunia.com/advisories/42758 | third-party-advisory x_refsource_SECUNIA |
https://bugzilla.redhat.com/show_bug.cgi?id=616998 | x_refsource_CONFIRM |
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2ebc3464781ad24474abcbd2274e6254689853b5 | x_refsource_CONFIRM |
http://www.vupen.com/english/advisories/2011/0070 | vdb-entry x_refsource_VUPEN |
http://www.openwall.com/lists/oss-security/2010/07/21/4 | mailing-list x_refsource_MLIST |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://www.securityfocus.com/bid/41854 | vdb-entry x_refsource_BID x_transferred |
http://www.ubuntu.com/usn/USN-1041-1 | vendor-advisory x_refsource_UBUNTU x_transferred |
http://www.openwall.com/lists/oss-security/2010/07/21/10 | mailing-list x_refsource_MLIST x_transferred |
http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00004.html | vendor-advisory x_refsource_SUSE x_transferred |
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35 | x_refsource_CONFIRM x_transferred |
http://secunia.com/advisories/42758 | third-party-advisory x_refsource_SECUNIA x_transferred |
https://bugzilla.redhat.com/show_bug.cgi?id=616998 | x_refsource_CONFIRM x_transferred |
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2ebc3464781ad24474abcbd2274e6254689853b5 | x_refsource_CONFIRM x_transferred |
http://www.vupen.com/english/advisories/2011/0070 | vdb-entry x_refsource_VUPEN x_transferred |
http://www.openwall.com/lists/oss-security/2010/07/21/4 | mailing-list x_refsource_MLIST x_transferred |
Integer overflow in the btrfs_ioctl_clone function in fs/btrfs/ioctl.c in the Linux kernel before 2.6.35 might allow local users to obtain sensitive information via a BTRFS_IOC_CLONE_RANGE ioctl call.
Date Added | Due Date | Vulnerability Name | Required Action |
---|---|---|---|
N/A |
Type | Version | Base score | Base severity | Vector |
---|---|---|---|---|
Primary | 3.1 | 5.5 | MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
Primary | 2.0 | 4.9 | MEDIUM | AV:L/AC:L/Au:N/C:C/I:N/A:N |