CVE-2009-0747

The ext4_isize function in fs/ext4/ext4.h in the Linux kernel 2.6.27 before 2.6.27.19 and 2.6.28 before 2.6.28.7 uses the i_size_high structure member during operations on arbitrary types of files, which allows local users to cause a denial of service (CPU consumption and error-message flood) by attempting to mount a crafted ext4 filesystem.
References
Link Resource
http://bugzilla.kernel.org/show_bug.cgi?id=12375 Patch
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=06a279d636734da32bb62dd2f7b0ade666f65d7c
http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.27.19
http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.28.7
http://rhn.redhat.com/errata/RHSA-2009-1243.html
http://secunia.com/advisories/34394
http://secunia.com/advisories/36562
http://secunia.com/advisories/37471
http://www.debian.org/security/2009/dsa-1749
http://www.securityfocus.com/archive/1/507985/100/0/threaded
http://www.ubuntu.com/usn/usn-751-1
http://www.vmware.com/security/advisories/VMSA-2009-0016.html
http://www.vupen.com/english/advisories/2009/0509 Vendor Advisory
http://www.vupen.com/english/advisories/2009/3316
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8585
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9200
http://bugzilla.kernel.org/show_bug.cgi?id=12375 Patch
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=06a279d636734da32bb62dd2f7b0ade666f65d7c
http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.27.19
http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.28.7
http://rhn.redhat.com/errata/RHSA-2009-1243.html
http://secunia.com/advisories/34394
http://secunia.com/advisories/36562
http://secunia.com/advisories/37471
http://www.debian.org/security/2009/dsa-1749
http://www.securityfocus.com/archive/1/507985/100/0/threaded
http://www.ubuntu.com/usn/usn-751-1
http://www.vmware.com/security/advisories/VMSA-2009-0016.html
http://www.vupen.com/english/advisories/2009/0509 Vendor Advisory
http://www.vupen.com/english/advisories/2009/3316
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8585
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9200
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:2.6.27:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.27:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.27:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.27:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.27:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.27:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.27:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.27:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.27:rc8:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.27:rc9:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.27.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.27.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.27.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.27.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.27.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.27.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.27.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.27.8:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.27.9:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.27.10:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.27.11:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.27.12:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.27.13:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.27.14:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.27.15:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.27.16:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.27.17:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.27.18:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.28:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.28:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.28:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.28:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.28:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.28:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.28:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.28:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.28.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.28.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.28.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.28.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.28.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.28.6:*:*:*:*:*:*:*

History

21 Nov 2024, 01:00

Type Values Removed Values Added
References () http://bugzilla.kernel.org/show_bug.cgi?id=12375 - Patch () http://bugzilla.kernel.org/show_bug.cgi?id=12375 - Patch
References () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=06a279d636734da32bb62dd2f7b0ade666f65d7c - () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=06a279d636734da32bb62dd2f7b0ade666f65d7c -
References () http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.27.19 - () http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.27.19 -
References () http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.28.7 - () http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.28.7 -
References () http://rhn.redhat.com/errata/RHSA-2009-1243.html - () http://rhn.redhat.com/errata/RHSA-2009-1243.html -
References () http://secunia.com/advisories/34394 - () http://secunia.com/advisories/34394 -
References () http://secunia.com/advisories/36562 - () http://secunia.com/advisories/36562 -
References () http://secunia.com/advisories/37471 - () http://secunia.com/advisories/37471 -
References () http://www.debian.org/security/2009/dsa-1749 - () http://www.debian.org/security/2009/dsa-1749 -
References () http://www.securityfocus.com/archive/1/507985/100/0/threaded - () http://www.securityfocus.com/archive/1/507985/100/0/threaded -
References () http://www.ubuntu.com/usn/usn-751-1 - () http://www.ubuntu.com/usn/usn-751-1 -
References () http://www.vmware.com/security/advisories/VMSA-2009-0016.html - () http://www.vmware.com/security/advisories/VMSA-2009-0016.html -
References () http://www.vupen.com/english/advisories/2009/0509 - Vendor Advisory () http://www.vupen.com/english/advisories/2009/0509 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2009/3316 - () http://www.vupen.com/english/advisories/2009/3316 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8585 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8585 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9200 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9200 -

07 Nov 2023, 02:03

Type Values Removed Values Added
References
  • {'url': 'http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=06a279d636734da32bb62dd2f7b0ade666f65d7c', 'name': 'http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=06a279d636734da32bb62dd2f7b0ade666f65d7c', 'tags': [], 'refsource': 'CONFIRM'}
  • () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=06a279d636734da32bb62dd2f7b0ade666f65d7c -

Information

Published : 2009-02-27 17:30

Updated : 2024-11-21 01:00


NVD link : CVE-2009-0747

Mitre link : CVE-2009-0747

CVE.ORG link : CVE-2009-0747


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-399

Resource Management Errors