oss-sec mailing list archives
Re: CVE request: kernel: xfs heap overflow
From: Kurt Seifried <kseifried () redhat com>
Date: Tue, 10 Jan 2012 14:45:24 -0700
On 01/10/2012 02:19 PM, Kurt Seifried wrote:
On 01/10/2012 11:57 AM, Xi Wang wrote:Commit ef14f0c1578dce4b688726eb2603e50b62d6665a introduced an integer overflow in the ACL handling code, which could further lead to heap-based buffer overflow via a crafted filesystem. Upstream commits: http://git.kernel.org/linus/fa8b18edd752a8b4e9d1ee2cd615b82c93cf8bba http://git.kernel.org/linus/093019cf1b18dd31b2c3b77acce4e000e2cbc9ce Both commits are needed to fix the vulnerability. The vulnerability seems to first appear in 2.6.32-rc1. 3.2 contains only the first commit. - xiDo you need a CVE for this?
I apologize, I'm still getting used to Thunderbird (Vince says I should use mutt, I suspect he may be correct) which places the subject line well above the message body so when I scan it I'm usually looking at the To: and CC: line and not seeing the subject (as evidenced by me asking stupid questions like this about once a day =). Please use CVE-2012-0038 for this kernel issue. -- -- Kurt Seifried / Red Hat Security Response Team
Current thread:
- CVE request: kernel: xfs heap overflow Xi Wang (Jan 10)
- Re: CVE request: kernel: xfs heap overflow Kurt Seifried (Jan 10)
- Re: CVE request: kernel: xfs heap overflow Kurt Seifried (Jan 10)
- Re: CVE request: kernel: xfs heap overflow Kurt Seifried (Jan 10)