Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Tue, 3 Jul 2012 15:22:17 +0200
From: Marcus Meissner <meissner@...e.de>
To: OSS Security List <oss-security@...ts.openwall.com>
Cc: jack@...e.cz
Subject: CVE Request: Stability fixes in UDF Logical Volume Descriptor
	handling

Hi,

People (do not know who) reported to the kernel security team
and Jan Kara some UDF filesystem crashes.

Jan Kara did some fixes in the UDF fs and they were committed
to mainline already, both actual bugfixes and some more sanity
checking for hardening.

Buffer overreads or overwrites would have been possible.


I think a single CVE is sufficient.


The two mainline commits:
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux.git;a=commitdiff;h=1df2ae31c724e57be9d7ac00d78db8a5dabdd050
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux.git;a=commitdiff;h=adee11b2085bee90bd8f4f52123ffb07882d6256


commit 1df2ae31c724e57be9d7ac00d78db8a5dabdd050
Author: Jan Kara <jack@...e.cz>
Date:   Wed Jun 27 21:23:07 2012 +0200

    udf: Fortify loading of sparing table

    Add sanity checks when loading sparing table from disk to avoid accessing
    unallocated memory or writing to it.

    Signed-off-by: Jan Kara <jack@...e.cz>

commit adee11b2085bee90bd8f4f52123ffb07882d6256
Author: Jan Kara <jack@...e.cz>
Date:   Wed Jun 27 20:20:22 2012 +0200

    udf: Avoid run away loop when partition table length is corrupted
    
    Check provided length of partition table so that (possibly maliciously)
    corrupted partition table cannot cause accessing data beyond current buffer.
    
    Signed-off-by: Jan Kara <jack@...e.cz>

Ciao, Marcus

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.