Date: Tue, 10 May 2011 09:28:30 +0200 From: Timo Warns <warns@...-sense.de> To: oss-security@...ts.openwall.com CC: Sebastian Krahmer <krahmer@...e.de>, "Steven M. Christey" <coley@...us.mitre.org> Subject: Re: CVE request: kernel: validate size of EFI GUID partition entries Hi, from my point of view, these are different bugs: CVE-2011-1577 addresses the overall header size used for a CRC32 computation. CVE-2011-1776 addresses the size of partition entries used for allocating a data structure. Of course, one could argue that this is only one issue "missing input validation on GUID partition tables". Cheers, Timo Am 10.05.2011 09:18, schrieb Sebastian Krahmer: > > Hi, > > Is this really different than what was assigned CVE-2011-1577 to? > See http://www.spinics.net/lists/mm-commits/msg83274.html or the text > on the OSS mail on April 12th which reads exactly the same. > > Sebastian > > On Mon, May 09, 2011 at 03:01:06PM -0400, Josh Bressers wrote: >> >> >> ----- Original Message ----- >>> The kernel automatically evaluates partition tables of storage >>> devices. >>> The code for evaluating GUID partitions (in fs/partitions/efi.c) >>> contains a bug that can cause a kernel heap overflow on certain >>> corrupted GUID partition tables. >>> >>> http://git.kernel.org/linus/fa039d5f6b126fbd65eefa05db2f67e44df8f121 >>> http://bugzilla.redhat.com/show_bug.cgi?id=703026 >>> >> >> Please use CVE-2011-1776 >> >> Thanks. >> >> -- >> JB >
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.