oss-sec mailing list archives

Re: CVE Request -- kernel: xfs: potential buffer overflow in xfs_readlink()


From: Kurt Seifried <kseifried () redhat com>
Date: Wed, 26 Oct 2011 08:20:31 -0600

On 10/26/2011 05:05 AM, Petr Matousek wrote:
A flaw was found in the way Linux kernel's XFS filesystem implementation
handled links with pathname larger than MAXPATHLEN. When
CONFIG_XFS_DEBUG configuration option was not enabled when compiling
Linux kernel, an attacker able to mount malicious XFS image could use
this flaw to crash the system, or potentially, elevate his privileges
on that system.

Proposed upstream patch:
http://oss.sgi.com/archives/xfs/2011-10/msg00345.html

References:
https://bugzilla.redhat.com/show_bug.cgi?id=749156
http://oss.sgi.com/archives/xfs/2011-10/msg00345.html

Thanks,
Please use CVE-2011-4077 for this issue.

-- 

-Kurt Seifried / Red Hat Security Response Team


Current thread: