Vigil@nce: Linux kernel, dénial of service via ext4
October 2011 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
A local attacker can use an ext4 filesystem, in order to stop the
kernel.
– Severity: 1/4
– Creation date: 21/10/2011
IMPACTED PRODUCTS
– Linux kernel
DESCRIPTION OF THE VULNERABILITY
The ext4 filesystem uses "extents" to store contiguous information.
The ext4_ext_convert_to_initialized() function of file
fs/ext4/extents.c processes extents by splitting and grouping
them. The fallocate() function is used to allocate space for a
file. Using this function on an ext4 filesystem leads to a call to
the BUG_ON() macro in some cases.
A local attacker can therefore use an ext4 filesystem, in order to
stop the kernel.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/Linux-kernel-denial-of-service-via-ext4-11093