CVE-2009-0748
Publication date 27 February 2009
Last updated 24 July 2024
Ubuntu priority
The ext4_fill_super function in fs/ext4/super.c in the Linux kernel 2.6.27 before 2.6.27.19 and 2.6.28 before 2.6.28.7 does not validate the superblock configuration, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) by attempting to mount a crafted ext4 filesystem.
From the Ubuntu Security Team
The ext4 filesystem did not correctly validate certain superblock fields. A local attacker could mount a malicious ext4 filesystem, causing a system crash, leading to a denial of service.
Status
Package | Ubuntu Release | Status |
---|---|---|
linux | 9.04 jaunty |
Not affected
|
8.10 intrepid |
Fixed 2.6.27-11.31
|
|
8.04 LTS hardy |
Fixed 2.6.24-23.52
|
|
7.10 gutsy | Not in release | |
6.06 LTS dapper | Not in release | |
linux-source-2.6.15 | 9.04 jaunty | Not in release |
8.10 intrepid | Not in release | |
8.04 LTS hardy | Not in release | |
7.10 gutsy | Not in release | |
6.06 LTS dapper |
Not affected
|
|
linux-source-2.6.22 | 9.04 jaunty | Not in release |
8.10 intrepid | Not in release | |
8.04 LTS hardy | Not in release | |
7.10 gutsy |
Fixed 2.6.22-16.62
|
|
6.06 LTS dapper | Not in release |