Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 246710 (CVE-2008-5025)

Summary: Kernel: hfs_cat_find_brec() buffer overflow (CVE-2008-5025)
Product: Gentoo Security Reporter: stupendoussteve
Component: KernelAssignee: Gentoo Security <security>
Status: RESOLVED FIXED    
Severity: normal CC: kernel
Priority: High    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.27.y.git;a=commit;h=d38b7aa7fc3371b52d036748028db50b585ade2e
Whiteboard: [linux <2.6.27.6] [gp < 2.6.26-5]
Package list:
Runtime testing required: ---

Description stupendoussteve 2008-11-14 12:25:38 UTC
Ref: http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.27.6
Ref: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5025 (under review)

This is apparently a different issue than bug 245650 (CVE-2008-4933).

Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service) or to potentially compromise a vulnerable system.

The vulnerability is caused due to a boundary error in the "hfs_cat_find_brec()" function and can be exploited to cause a buffer overflow via an overly large catalog name length.

Successful exploitation requires that a user is tricked into mounting a specially crafted hfs image.

The vulnerability is reported in versions prior to 2.6.27.6.

Reproducible: Always
Comment 1 Stefan Behte (RETIRED) gentoo-dev Security 2008-11-19 12:32:05 UTC
*** Bug 247574 has been marked as a duplicate of this bug. ***