1) A vulnerability is caused due to the "hfsplus_find_cat()" function in fs/hfsplus/catalog.c not properly checking the catalog name length. This can be exploited to crash a system by e.g. mounting a specially crafted hfsplus file system. 2) A vulnerability is caused due to the "hfsplus_block_allocate()" function in fs/hfsplus/bitmap.c not properly checking the return values of "read_mapping_page()" function before using them. This can be exploited to crash a system by e.g. mounting a specially crafted hfsplus file system. Info copied from secunia advisory SA32510.
Patches are in stable-review for 2.6.27. Not yet been added to 2.6.25/2.6.26 stable-queue. http://git.kernel.org/?p=linux/kernel/git/stable/stable-queue.git;a=blob;f=review-2.6.27/hfsplus-fix-buffer-overflow-with-a-corrupted-image.patch;h=c1ed9581904ff6f4c6716e2f5c1bbf00a6575e1f;hb=5ec3cec5e9b2b11eeb1294668bd865fabe8437a8 http://git.kernel.org/?p=linux/kernel/git/stable/stable-queue.git;a=blob;f=review-2.6.27/hfsplus-check-read_mapping_page-return-value.patch;h=89be1a179372f3f861feab810102aa6bb3a24b52;hb=5ec3cec5e9b2b11eeb1294668bd865fabe8437a8
These vulns are fixed in 2.6.27.5. Beware however, neither of these were fixed in 2.6.25.20, nor 2.6.26.8.
hardened-kernel unaffected at present time. Removing alias. PS: genpatches-2.6.27-5 added 2.6.27.5. Also, the relevant patches were added to genpatches-2.6.26-4. =genpatches-2.6.25* remains vulnerable. However, hardened-sources-2.6.25-r13 does not because we independently folded in the necessary patches.