The ext4_isize function in fs/ext4/ext4.h in the Linux kernel 2.6.27 before 2.6.27.19 and 2.6.28 before 2.6.28.7 uses the i_size_high structure member during operations on arbitrary types of files, which allows local users to cause a denial of service (CPU consumption and error-message flood) by attempting to mount a crafted ext4 filesystem.
http://bugzilla.kernel.org/show_bug.cgi?id=12375
http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.27.19
http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.28.7
http://rhn.redhat.com/errata/RHSA-2009-1243.html
http://secunia.com/advisories/34394
http://secunia.com/advisories/36562
http://secunia.com/advisories/37471
http://www.debian.org/security/2009/dsa-1749
http://www.securityfocus.com/archive/1/507985/100/0/threaded
http://www.ubuntu.com/usn/usn-751-1
http://www.vmware.com/security/advisories/VMSA-2009-0016.html
http://www.vupen.com/english/advisories/2009/0509
http://www.vupen.com/english/advisories/2009/3316
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8585
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9200
OR
cpe:2.3:o:linux:linux_kernel:2.6.27:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.27:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.27:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.27:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.27:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.27:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.27:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.27:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.27:rc8:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.27:rc9:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.27.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.27.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.27.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.27.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.27.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.27.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.27.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.27.8:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.27.9:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.27.10:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.27.11:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.27.12:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.27.13:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.27.14:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.27.15:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.27.16:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.27.17:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.27.18:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.28:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.28:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.28:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.28:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.28:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.28:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.28:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.28:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.28.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.28.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.28.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.28.4:*:*:*:*:*:*:*
ID | Name | Product | Family | Severity |
---|---|---|---|---|
89117 | VMware ESX / ESXi Multiple Vulnerabilities (VMSA-2009-0016) (remote check) | Nessus | Misc. | critical |
79507 | OracleVM 2.2 : kernel (OVMSA-2013-0039) | Nessus | OracleVM Local Security Checks | critical |
43779 | CentOS 5 : kernel (CESA-2009:1243) | Nessus | CentOS Local Security Checks | medium |
42870 | VMSA-2009-0016 : VMware vCenter and ESX update release and vMA patch release address multiple security issues in third party components. | Nessus | VMware ESX Local Security Checks | critical |
40835 | RHEL 5 : kernel (RHSA-2009:1243) | Nessus | Red Hat Local Security Checks | medium |
37337 | Ubuntu 7.10 / 8.04 LTS / 8.10 : linux, linux-source-2.6.22 vulnerabilities (USN-751-1) | Nessus | Ubuntu Local Security Checks | critical |
35987 | Debian DSA-1749-1 : linux-2.6 - denial of service/privilege escalation/sensitive memory leak | Nessus | Debian Local Security Checks | critical |