|
Message-ID: <4C6B76BC.3080902@redhat.com> Date: Wed, 18 Aug 2010 13:59:24 +0800 From: Eugene Teo <eugene@...hat.com> To: oss-security@...ts.openwall.com CC: "Steven M. Christey" <coley@...us.mitre.org> Subject: CVE request - kernel: xfs: stale data exposure An issue was found in the XFS filehandle conversion where inodes that are deleted may return as valid files as XFS does not verify the inode numbers in the file handles, i.e. allowing access to deleted data. The test program that demonstrates the issue via the open_by_handle interface can be found here: http://oss.sgi.com/archives/xfs/2010-06/msg00191.html. [PATCH 1/4] xfs: always use iget in bulkstat http://article.gmane.org/gmane.comp.file-systems.xfs.general/33770 [PATCH 2/4] xfs: validate untrusted inode numbers during lookup http://article.gmane.org/gmane.comp.file-systems.xfs.general/33771 This following patch is needed too to address a regression introduced by the patches above: http://oss.sgi.com/archives/xfs/2010-08/msg00179.html. Reference: https://bugzilla.redhat.com/show_bug.cgi?id=624923 Thanks, Eugene -- main(i) { putchar(182623909 >> (i-1) * 5&31|!!(i<7)<<6) && main(++i); }
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.