From $URL : ext3_msg() takes the printk prefix as the second parameter and the format string as the third parameter. Two callers of ext3_msg omit the prefix and pass the format string as the second parameter and the first parameter to the format string as the third parameter. In both cases this string comes from an arbitrary source. An user able to mount ext3 filesystems could use this flaw to crash the system or, potentially, increase their privileges. Upstream fix: http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8d0c2d10dd72c5292eda7a06231056a4c972e4cc References: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-1848
Patch in mainline 3.9 onwards