Linux 2.6.x ext3 filesystem code fails to properly handle corrupted data structures, leading to an exploitable denial of service issue with potential fs corruption, when a read operation is done on a crafted ext3 stream.
Created attachment 104602 [details, diff] Patch for 2.6.18 and 2.6.19
Fixed versions: gentoo-sources-2.6.18-r6 genpatches-2.6.18-8 gentoo-sources-2.6.19-r3 genpatches-2.6.19-4
Proposed metadata: [linux < 2.6.16.38] via http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.38 [gp < 2.6.18-8] [gp > 2.6.18-8 < 2.6.19-4] [gentoo < 2.6.18-r6] [gentoo > 2.6.18-r6 < 2.6.19-r3]