[prev in list] [next in list] [prev in thread] [next in thread]
List: oss-security
Subject: Re: [oss-security] CVE-2008-3528 Linux kernel ext[234] directory
From: Eugene Teo <eteo () redhat ! com>
Date: 2008-10-21 0:55:04
Message-ID: 48FD2868.5090408 () redhat ! com
[Download RAW message or body]
Eugene Teo wrote:
> Eugene Teo wrote:
>> The ext[234] filesystem code fails to properly handle corrupted data
>> structures. With a mounted filesystem image or partition that have
>> corrupted dir->i_size and dir->i_blocks, a user performing either a read
>> or write operation on the mounted image or partition can lead to a
>> possible denial of service.
>>
>> References:
>> https://bugzilla.redhat.com/show_bug.cgi?id=459577
>> http://lkml.org/lkml/2008/9/13/98
>> http://lkml.org/lkml/2008/9/13/99
>> http://lkml.org/lkml/2008/9/17/371
>>
>> The issue is not fixed upstream yet, but the patch has been added to -mm
>> tree. I will update this email as soon as I know the commit hashes.
>> This issue has been allocated with CVE-2008-3528.
>
> Upstream commits: cdbf6dba28e8e6268c8420857696309470009fd9 (ext3)
> bd39597cbd42a784105a04010100e27267481c67 (ext2)
Not forgetting 9d9f177572d9e4eba0f2e18523b44f90dd51fe74 (ext4) too.
Thanks, Eugene
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic