| To: | agent99@xxxxxxx, linux-xfs@xxxxxxxxxxx, bugtraq@xxxxxxxxxxxxxxxxx |
|---|---|
| Subject: | Re: IRIX XFS filesystem denial of service attack |
| From: | H D Moore <sflist@xxxxxxxxxxxxxxxxxx> |
| Date: | Mon, 15 Apr 2002 18:32:38 -0500 |
| Delivered-to: | mailing list bugtraq@securityfocus.com |
| Delivered-to: | moderator for bugtraq@securityfocus.com |
| In-reply-to: | <10204151449.ZM268355@einstein.csd.sgi.com> |
| Mailing-list: | contact bugtraq-help@securityfocus.com; run by ezmlm |
| Priority: | urgent |
| References: | <10204151449.ZM268355@einstein.csd.sgi.com> |
| Sender: | linux-xfs-bounce@xxxxxxxxxxx |
Does this vulnerability affect the Linux XFS port? The XFS page has no information about this or whether there is a fix available: http://oss.sgi.com/projects/xfs/ -HD On Monday 15 April 2002 04:49 pm, SGI Security Coordinator wrote: > > SGI Security Advisory > > Title: IRIX XFS filesystem denial of service attack > Number: 20020402-01-P > Date: April 15, 2002 > Reference: CAN-2002-0042 > ----------------------- > --- Issue Specifics --- > ----------------------- > > It has been reported that there is a vulnerability in IRIX's XFS > filesystem. Under some circumstances, a user can create a file that would > hang any application that would try to access it. This has the potential > to be used to create a Denial of Service attack. |
| <Prev in Thread] | Current Thread | [Next in Thread> |
|---|---|---|
| ||
| Previous by Date: | Re: IRIX XFS filesystem denial of service attack, Eric Sandeen |
|---|---|
| Next by Date: | [Bug 202] XFS data corruption, bugzilla-daemon |
| Previous by Thread: | Kernel 2.4.20 and XFS 1.2pre3, Flameeyes |
| Next by Thread: | Re: IRIX XFS filesystem denial of service attack, Eric Sandeen |
| Indexes: | [Date] [Thread] [Top] [All Lists] |