Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 279898 (CVE-2009-2407)

Summary: eCryptfs: < parse_tag_3_packet check tag 3 packet encrypted key size (CVE-2009-2407)
Product: Gentoo Security Reporter: kfm
Component: KernelAssignee: Gentoo Security <security>
Severity: normal CC: hardened-kernel+disabled, kernel
Priority: High    
Version: unspecified   
Hardware: All   
OS: Linux   
Whiteboard: [linux <] [linux >=2.6.28 <]
Package list:
Runtime testing required: ---

Description kfm 2009-08-01 11:57:31 UTC
Spotted in the ChangeLog:

commit 59a1c9b5b74e95eea73a6f85c574bd63031a0bcf
Author: Ramon de Carvalho Valle <>
Date:   Tue Jul 28 13:58:22 2009 -0500

eCryptfs: parse_tag_3_packet check tag 3 packet encrypted key size (CVE-2009-2407)

commit f151cd2c54ddc7714e2f740681350476cda03a28 upstream.

The parse_tag_3_packet function does not check if the tag 3 packet contains a
encrypted key size larger than ECRYPTFS_MAX_ENCRYPTED_KEY_BYTES.

Signed-off-by: Ramon de Carvalho Valle <>
[ Added printk newline and changed goto to out_free]
Signed-off-by: Tyler Hicks <>
Signed-off-by: Linus Torvalds <>
Signed-off-by: Greg Kroah-Hartman <>
Comment 1 Alex Legler (RETIRED) archtester gentoo-dev Security 2009-08-01 15:07:34 UTC
CVE-2009-2407 (
  Heap-based buffer overflow in the parse_tag_3_packet function in
  fs/ecryptfs/keystore.c in the eCryptfs subsystem in the Linux kernel
  before allows local users to cause a denial of service
  (system crash) or possibly gain privileges via vectors involving a
  crafted eCryptfs file, related to a large encrypted key size in a Tag
  3 packet.