|
Message-ID: <20120703132217.GG18781@suse.de> Date: Tue, 3 Jul 2012 15:22:17 +0200 From: Marcus Meissner <meissner@...e.de> To: OSS Security List <oss-security@...ts.openwall.com> Cc: jack@...e.cz Subject: CVE Request: Stability fixes in UDF Logical Volume Descriptor handling Hi, People (do not know who) reported to the kernel security team and Jan Kara some UDF filesystem crashes. Jan Kara did some fixes in the UDF fs and they were committed to mainline already, both actual bugfixes and some more sanity checking for hardening. Buffer overreads or overwrites would have been possible. I think a single CVE is sufficient. The two mainline commits: http://git.kernel.org/?p=linux/kernel/git/torvalds/linux.git;a=commitdiff;h=1df2ae31c724e57be9d7ac00d78db8a5dabdd050 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux.git;a=commitdiff;h=adee11b2085bee90bd8f4f52123ffb07882d6256 commit 1df2ae31c724e57be9d7ac00d78db8a5dabdd050 Author: Jan Kara <jack@...e.cz> Date: Wed Jun 27 21:23:07 2012 +0200 udf: Fortify loading of sparing table Add sanity checks when loading sparing table from disk to avoid accessing unallocated memory or writing to it. Signed-off-by: Jan Kara <jack@...e.cz> commit adee11b2085bee90bd8f4f52123ffb07882d6256 Author: Jan Kara <jack@...e.cz> Date: Wed Jun 27 20:20:22 2012 +0200 udf: Avoid run away loop when partition table length is corrupted Check provided length of partition table so that (possibly maliciously) corrupted partition table cannot cause accessing data beyond current buffer. Signed-off-by: Jan Kara <jack@...e.cz> Ciao, Marcus
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.