Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 245650 (CVE-2008-4933)

Summary: Linux Kernel<2.6.28-r1 "hfsplus_find_cat()" and "hfsplus_block_allocate()" DOS (CVE-2008-{4933,4934})
Product: Gentoo Security Reporter: Stefan Behte (RETIRED) <craig>
Component: KernelAssignee: Gentoo Security <security>
Status: RESOLVED FIXED    
Severity: minor CC: kernel
Priority: High    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: http://kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.28-rc1
Whiteboard: [linux <2.6.27.5]
Package list:
Runtime testing required: ---

Description Stefan Behte (RETIRED) gentoo-dev Security 2008-11-05 12:19:31 UTC
1) A vulnerability is caused due to the "hfsplus_find_cat()" function
in fs/hfsplus/catalog.c not properly checking the catalog name length.
This can be exploited to crash a system by e.g. mounting a specially
crafted hfsplus file system.

2) A vulnerability is caused due to the "hfsplus_block_allocate()"
function in fs/hfsplus/bitmap.c not properly checking the return
values of "read_mapping_page()" function before using them. This can
be exploited to crash a system by e.g. mounting a specially crafted
hfsplus file system.

Info copied from secunia advisory SA32510.
Comment 2 Gordon Malm (RETIRED) gentoo-dev 2008-11-12 07:11:19 UTC
These vulns are fixed in 2.6.27.5.  Beware however, neither of these were fixed in 2.6.25.20, nor 2.6.26.8.
Comment 3 kfm 2009-07-21 00:32:06 UTC
hardened-kernel unaffected at present time. Removing alias.

PS: genpatches-2.6.27-5 added 2.6.27.5. Also, the relevant patches were added to genpatches-2.6.26-4. =genpatches-2.6.25* remains vulnerable. However, hardened-sources-2.6.25-r13 does not because we independently folded in the necessary patches.