Integer signedness error in the btrfs_ioctl_space_info function in the Linux kernel 2.6.37 allows local users to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted slot value.
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.
Link | Tags |
---|---|
http://marc.info/?l=oss-security&m=129726743519620&w=2 | third party advisory |
http://marc.info/?l=linux-kernel&m=129726078708425&w=2 | third party advisory patch |
https://github.com/BlankOn/linux-debian/blob/master/debian/changelog.BlankOn | third party advisory release notes |
http://vulnfactory.org/vulns/ | third party advisory |