Summary: | eCryptfs: <2.6.30.4 parse_tag_3_packet check tag 3 packet encrypted key size (CVE-2009-2407) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | kfm |
Component: | Kernel | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | hardened-kernel+disabled, kernel |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=f151cd2c54ddc7714e2f740681350476cda03a28 | ||
Whiteboard: | [linux <2.6.27.29] [linux >=2.6.28 <2.6.30.4] | ||
Package list: | Runtime testing required: | --- |
Description
kfm
2009-08-01 11:57:31 UTC
CVE-2009-2407 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2407): Heap-based buffer overflow in the parse_tag_3_packet function in fs/ecryptfs/keystore.c in the eCryptfs subsystem in the Linux kernel before 2.6.30.4 allows local users to cause a denial of service (system crash) or possibly gain privileges via vectors involving a crafted eCryptfs file, related to a large encrypted key size in a Tag 3 packet. |