Not sure when this is fixed. Filing this to be safe. Linux kernel 2.6.x, when using both NFS and EXT3, allows remote attackers to cause a denial of service (file system panic) via a crafted UDP packet with a V2 lookup procedure that specifies a bad file handle (inode number), which triggers an error and causes an exported directory to be remounted read-only.
Patch for ext3: http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff_plain;h=2ccb48ebb4de139eef4fcefd5f2bb823cb0d81b9;hp=f712c0c7e1796f92e45e4de144e247816d974b8f Another useful patch for ext3: http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff_plain;h=0e31f51d8177320d61ec5786ca4aafa7b7a749b4;hp=51d8c5edd3b166fcc51aba84d78761d578400a7c Patch for ext2, unconfirmed and may cause harm to cute innocent bunnies, wear eye protection: http://lkml.org/lkml/2006/7/24/263
Maintainers, please add two ext3 patches above, or bump to 2.6.17.11. rsbac-sources-2.6: kang sh-sources-2.6: sh herd usermode-sources-2.6: dang xbox-sources-2.6: chrb, gimli xen-sources-2.6: xen herd
usermode-sources-2.6.16-r5 added.
Patches added to xen-sources-2.6.16.28
rsbac-sources bumped to 2.6.18 in ~
Xbox-sources and sh-sources are no longer covered by Gentoo Security. Closing.