Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 21 Oct 2008 08:53:15 +0800
From: Eugene Teo <eteo@...hat.com>
To: oss-security@...ts.openwall.com
Subject: Re: CVE-2008-3528 Linux kernel ext[234] directory
 corruption DoS

Eugene Teo wrote:
> The ext[234] filesystem code fails to properly handle corrupted data
> structures. With a mounted filesystem image or partition that have
> corrupted dir->i_size and dir->i_blocks, a user performing either a read
> or write operation on the mounted image or partition can lead to a
> possible denial of service.
> 
> References:
> https://bugzilla.redhat.com/show_bug.cgi?id=459577
> http://lkml.org/lkml/2008/9/13/98
> http://lkml.org/lkml/2008/9/13/99
> http://lkml.org/lkml/2008/9/17/371
> 
> The issue is not fixed upstream yet, but the patch has been added to -mm
>  tree. I will update this email as soon as I know the commit hashes.
> This issue has been allocated with CVE-2008-3528.

Upstream commits: cdbf6dba28e8e6268c8420857696309470009fd9 (ext3)
		  bd39597cbd42a784105a04010100e27267481c67 (ext2)

Thanks, Eugene

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.