[Bug 200933] Divide zero in __ext4_check_dir_entry

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



https://bugzilla.kernel.org/show_bug.cgi?id=200933

--- Comment #3 from Theodore Tso (tytso@xxxxxxx) ---
Patch to fix this:

http://patchwork.ozlabs.org/patch/962516/

Note: I will probably be retitling and rewriting the patch description, because
on further reflection, it's not possible for this to become a buffer overrun
attack.   That's because we are checking to make sure the inline directory does
not exceed the bounds of the inline data xattr.  The size == 0 is coming from
the "end of xattr list" marker in the xattr data structure.  That has to be
there, or we would have declared the xattr data structure to be corrupt before
we even tried to parse the inline directory.   So the only way the attacker can
manifest a problem is by causing the divide by zero in
__ext4_check_dir_entry().

So for CVE scoring purposes, this is just a denial of service attack
(triggering a kernel divide by zero trap, which doesn't kill the kernel per se,
but which leaves various locks and refcounts held, which will eventually cause
the system to become wedged).  It is not a buffer overrun.

-- 
You are receiving this mail because:
You are watching the assignee of the bug.



[Index of Archives]     [Reiser Filesystem Development]     [Ceph FS]     [Kernel Newbies]     [Security]     [Netfilter]     [Bugtraq]     [Linux FS]     [Yosemite National Park]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Samba]     [Device Mapper]     [Linux Media]

  Powered by Linux