Summary: | eCryptfs: <2.6.30.4 Check Tag 11 literal data buffer size (CVE-2009-2406) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | kfm <kfm> |
Component: | Kernel | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | hardened-kernel+disabled, kernel |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://git.kernel.org/?p=linux%2Fkernel%2Fgit%2Ftorvalds%2Flinux-2.6.git;a=commitdiff_plain;h=6352a29305373ae6196491e6d4669f301e26492e | ||
Whiteboard: | [linux <2.6.30.4] | ||
Package list: | Runtime testing required: | --- |
Description
kfm
2009-08-01 11:53:40 UTC
CVE-2009-2406 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2406): Stack-based buffer overflow in the parse_tag_11_packet function in fs/ecryptfs/keystore.c in the eCryptfs subsystem in the Linux kernel before 2.6.30.4 allows local users to cause a denial of service (system crash) or possibly gain privileges via vectors involving a crafted eCryptfs file, related to not ensuring that the key signature length in a Tag 11 packet is compatible with the key signature buffer size. |