oss-sec mailing list archives

Re: CVE-2008-3528 Linux kernel ext[234] directory corruption DoS


From: Eugene Teo <eteo () redhat com>
Date: Tue, 21 Oct 2008 08:55:04 +0800

Eugene Teo wrote:
Eugene Teo wrote:
The ext[234] filesystem code fails to properly handle corrupted data
structures. With a mounted filesystem image or partition that have
corrupted dir->i_size and dir->i_blocks, a user performing either a read
or write operation on the mounted image or partition can lead to a
possible denial of service.

References:
https://bugzilla.redhat.com/show_bug.cgi?id=459577
http://lkml.org/lkml/2008/9/13/98
http://lkml.org/lkml/2008/9/13/99
http://lkml.org/lkml/2008/9/17/371

The issue is not fixed upstream yet, but the patch has been added to -mm
 tree. I will update this email as soon as I know the commit hashes.
This issue has been allocated with CVE-2008-3528.

Upstream commits: cdbf6dba28e8e6268c8420857696309470009fd9 (ext3)
                bd39597cbd42a784105a04010100e27267481c67 (ext2)

Not forgetting 9d9f177572d9e4eba0f2e18523b44f90dd51fe74 (ext4) too.

Thanks, Eugene


Current thread: