Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Tue, 27 Apr 2010 20:09:26 -0400 (EDT)
From: Josh Bressers <bressers@...hat.com>
To: oss-security@...ts.openwall.com
Cc: coley@...us.mitre.org
Subject: Re: CVE request - gfs2 kernel issue

Please use CVE-2010-1436

Thanks.

-- 
    JB


----- "Eugene Teo" <eugene@...hat.com> wrote:

> When a struct gfs2_quota straddles a page boundary, the two pages 
> required to write out the complete quota were not being updated. 
> Instead, the first page was being written beyond its end. This buffer
> 
> overflow can cause a kernel panic. Since only the value field in
> struct 
> gfs2_quota needs to be updated and it's a 64-bit quantity that doesn't
> 
> ever straddle a page boundary by itself, we can seek to the proper
> page 
> where this value lies and write to it.
> 
> Steps to reproduce:
> https://bugzilla.redhat.com/show_bug.cgi?id=586006
> 
> My colleague will be posting the patch for the upstream kernel soon.
> 
> Thanks, eugene

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.