Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Wed, 13 Apr 2011 08:43:12 +0800
From: Eugene Teo <eugene@...hat.com>
To: oss-security@...ts.openwall.com
CC: Timo Warns <warns@...-sense.de>
Subject: Re: CVE Request: kernel: fs/partitions: Corrupted
 GUID partition tables can cause kernel oops

On 04/13/2011 05:53 AM, Timo Warns wrote:
> The Linux kernel automatically evaluates partition tables of storage
> devices. The code for evaluating EFI GUID partitions (in
> fs/partitions/efi.c) contains a bug that causes a kernel oops on certain
> corrupted GUID partition tables.
>
> A patch is available at
> http://www.spinics.net/lists/mm-commits/msg83274.html

Please use CVE-2011-1577.

Eugene
-- 
main(i) { putchar(182623909 >> (i-1) * 5&31|!!(i<7)<<6) && main(++i); }

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.