|
Message-ID: <20130320095132.GA18899@dhcp-25-225.brq.redhat.com> Date: Wed, 20 Mar 2013 10:51:32 +0100 From: Petr Matousek <pmatouse@...hat.com> To: oss-security@...ts.openwall.com Subject: CVE-2013-1848 -- Linux kernel: ext3: format string issues ext3_msg() takes the printk prefix as the second parameter and the format string as the third parameter. Two callers of ext3_msg omit the prefix and pass the format string as the second parameter and the first parameter to the format string as the third parameter. In both cases this string comes from an arbitrary source. An user able to mount ext3 filesystems could use this flaw to crash the system or, potentially, increase their privileges. Upstream fix: http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8d0c2d10dd72c5292eda7a06231056a4c972e4cc References: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-1848 Thanks, -- Petr Matousek / Red Hat Security Response Team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.