Linux Kernel EXT4 Memory Corruption...

- AV AC AU C I A
发布: 2016-11-15
修订: 2025-04-13

Mounting a crafted EXT4 image read-only leads to a memory corruption and SLAB out of bounds reads (according to KASAN). Since the mounting procedure is a privileged operation, an attacker is probably not able to trigger this vulnerability on the commandline. Instead the automatic mounting feature of the GUI via a crafted USB device is required.

0%
当前有1条漏洞利用/PoC
当前有0条受影响产品信息