Linux Kernel EXT4 Memory Corruption / SLAB Out-Of-Bounds Read

Discussion in 'News Aggregator' started by Packet Storm, 16 Nov 2016.

  1. Packet Storm

    Packet Storm Guest

    Mounting a crafted EXT4 image read-only leads to a memory corruption and SLAB out of bounds reads (according to KASAN). Since the mounting procedure is a privileged operation, an attacker is probably not able to trigger this vulnerability on the commandline. Instead the automatic mounting feature of the GUI via a crafted USB device is required.

    Continue reading...
     

Share This Page

Loading...