Vigil@nce - Linux kernel: denial of service via OCFS2
October 2010 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/
SYNTHESIS OF THE VULNERABILITY
A local attacker can mount a malicious OCFS2 filesystem, in order
to stop the kernel.
Severity: 1/4
Creation date: 01/10/2010
DESCRIPTION OF THE VULNERABILITY
Since its version 2.6.16, the Linux kernel supports the OCFS2
filesystem (Oracle Cluster File System).
A "fast symlink" is a symbolic link whose name is directly stored
in the OCFS2 inode block. This name ends with the null (’\0’)
character. However, if this character is missing, the kernel
continues to read after the end of block, until it reaches a
protected memory area.
A local attacker can therefore mount a malicious OCFS2 filesystem,
in order to stop the kernel.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/Linux-kernel-denial-of-service-via-OCFS2-9991