|
Message-ID: <4BD64DD3.7070804@redhat.com> Date: Tue, 27 Apr 2010 10:37:07 +0800 From: Eugene Teo <eugene@...hat.com> To: oss-security@...ts.openwall.com CC: coley@...us.mitre.org Subject: CVE request - gfs2 kernel issue When a struct gfs2_quota straddles a page boundary, the two pages required to write out the complete quota were not being updated. Instead, the first page was being written beyond its end. This buffer overflow can cause a kernel panic. Since only the value field in struct gfs2_quota needs to be updated and it's a 64-bit quantity that doesn't ever straddle a page boundary by itself, we can seek to the proper page where this value lies and write to it. Steps to reproduce: https://bugzilla.redhat.com/show_bug.cgi?id=586006 My colleague will be posting the patch for the upstream kernel soon. Thanks, eugene
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.