Date: Thu, 04 Sep 2008 22:15:05 +0800 From: Eugene Teo <eteo@...hat.com> To: oss-security@...ts.openwall.com CC: coley@...re.org Subject: CVE request: kernel: nfsd: fix buffer overrun decoding NFSv4 acl This was committed in upstream kernel recently. "[PATCH] nfsd: fix buffer overrun decoding NFSv4 acl The array we kmalloc() here is not large enough." Upstream commit: 91b80969ba466ba4b915a4a1d03add8c297add3f The array allocated in init_state() is not large enough. It is possible to write past the end of the allocated memory. This requires NFSv4 to be enabled. References: http://lkml.org/lkml/2008/9/3/286 https://bugzilla.redhat.com/show_bug.cgi?id=461101 Thanks, Eugene -- Eugene Teo / Red Hat Security Response Team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Powered by Openwall GNU/*/Linux - Powered by OpenVZ