[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    Re: [oss-security] CVE-2008-3528 Linux kernel ext[234] directory
From:       Eugene Teo <eteo () redhat ! com>
Date:       2008-10-21 0:55:04
Message-ID: 48FD2868.5090408 () redhat ! com
[Download RAW message or body]

Eugene Teo wrote:
> Eugene Teo wrote:
>> The ext[234] filesystem code fails to properly handle corrupted data
>> structures. With a mounted filesystem image or partition that have
>> corrupted dir->i_size and dir->i_blocks, a user performing either a read
>> or write operation on the mounted image or partition can lead to a
>> possible denial of service.
>>
>> References:
>> https://bugzilla.redhat.com/show_bug.cgi?id=459577
>> http://lkml.org/lkml/2008/9/13/98
>> http://lkml.org/lkml/2008/9/13/99
>> http://lkml.org/lkml/2008/9/17/371
>>
>> The issue is not fixed upstream yet, but the patch has been added to -mm
>>  tree. I will update this email as soon as I know the commit hashes.
>> This issue has been allocated with CVE-2008-3528.
> 
> Upstream commits: cdbf6dba28e8e6268c8420857696309470009fd9 (ext3)
> 		  bd39597cbd42a784105a04010100e27267481c67 (ext2)

Not forgetting 9d9f177572d9e4eba0f2e18523b44f90dd51fe74 (ext4) too.

Thanks, Eugene
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic