Your submission was sent successfully! Close

CVE-2009-0748

Published: 27 February 2009

The ext4_fill_super function in fs/ext4/super.c in the Linux kernel 2.6.27 before 2.6.27.19 and 2.6.28 before 2.6.28.7 does not validate the superblock configuration, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) by attempting to mount a crafted ext4 filesystem.

From the Ubuntu security team

The ext4 filesystem did not correctly validate certain superblock fields. A local attacker could mount a malicious ext4 filesystem, causing a system crash, leading to a denial of service.

Priority

Low

Status

Package Release Status
linux
Launchpad, Ubuntu, Debian
dapper Does not exist

gutsy Does not exist

hardy
Released (2.6.24-23.52)
intrepid
Released (2.6.27-11.31)
jaunty Not vulnerable

upstream Needs triage

linux-source-2.6.15
Launchpad, Ubuntu, Debian
dapper Not vulnerable

gutsy Does not exist

hardy Does not exist

intrepid Does not exist

jaunty Does not exist

upstream Needs triage

linux-source-2.6.22
Launchpad, Ubuntu, Debian
dapper Does not exist

gutsy
Released (2.6.22-16.62)
hardy Does not exist

intrepid Does not exist

jaunty Does not exist

upstream Needs triage