Date: Thu, 31 Mar 2016 17:11:29 +0200 From: Johannes Segitz <jsegitz@...e.com> To: oss-security@...ts.openwall.com Cc: cve-assign@...re.org Subject: ext4 data corruption due to punch hole races Hello, Jan Kara fixed some issues in the Linux kernel with security implications. https://bugzilla.suse.com/show_bug.cgi?id=972174 "When punching holes into a file races with the page fault of the same area, it is possible that freed blocks remain referenced from page cache pages mapped to process' address space. Thus modification of these blocks can corrupt data someone else is now storing in those blocks (which obviously has security implications if you can trick filesystem into storing some important file in those blocks). This affects all the kernels where we support ext4 for writing. Relevant fixes upstream are commits ea3d7209ca01da209cda6f0dea8be9cc4b7a933b, 17048e8a083fec7ad841d88ef0812707fbc7e39f, 32ebffd3bbb4162da5ff88f9a35dd32d0a28ea70, 011278485ecc3cd2a3954b5d4c73101d919bf1fa." Please assign CVE(s). Johannes -- GPG Key E7C81FA0 EE16 6BCE AD56 E034 BFB3 3ADD 7BF7 29D5 E7C8 1FA0 Subkey fingerprint: 250F 43F5 F7CE 6F1E 9C59 4F95 BC27 DD9D 2CC4 FD66 SUSE Linux GmbH, GF: Felix Imendörffer, Jane Smithard, Graham Norton HRB 21284 (AG Nürnberg) Download attachment "signature.asc" of type "application/pgp-signature" (802 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Powered by Openwall GNU/*/Linux - Powered by OpenVZ