Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Wed, 16 Feb 2011 16:41:30 +0800
From: Eugene Teo <eugene@...hat.com>
To: oss-security@...ts.openwall.com
CC: "Steven M. Christey" <coley@...us.mitre.org>
Subject: CVE request - kernel: xfs infoleak

 From Dan R0s3nbug5, "The FSGEOMETRY_V1 ioctl (and its compat 
equivalent) calls out to xfs_fs_geometry() with a version number of 3. 
This code path does not fill in the logsunit member of the passed 
xfs_fsop_geom_t, leading to the leaking of four bytes of uninitialized 
stack data to potentially unprivileged callers.  Since all other members 
are filled in all code paths and there are no padding bytes in this 
structure, it's safe to avoid an expensive memset() in favor of just 
clearing this one field."

https://patchwork.kernel.org/patch/555461/
https://bugzilla.redhat.com/show_bug.cgi?id=677260

Eugene

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ