Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Thu, 04 Sep 2008 22:15:05 +0800
From: Eugene Teo <eteo@...hat.com>
To: oss-security@...ts.openwall.com
CC: coley@...re.org
Subject: CVE request: kernel: nfsd: fix buffer overrun decoding NFSv4 acl

This was committed in upstream kernel recently.

"[PATCH] nfsd: fix buffer overrun decoding NFSv4 acl

The array we kmalloc() here is not large enough."

Upstream commit:
91b80969ba466ba4b915a4a1d03add8c297add3f

The array allocated in init_state() is not large enough. It is possible
to write past the end of the allocated memory. This requires NFSv4 to be
enabled.

References:
http://lkml.org/lkml/2008/9/3/286
https://bugzilla.redhat.com/show_bug.cgi?id=461101

Thanks, Eugene
-- 
Eugene Teo / Red Hat Security Response Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ