|
Message-ID: <Pine.GSO.4.51.0809041250090.29613@faron.mitre.org> Date: Thu, 4 Sep 2008 12:50:18 -0400 (EDT) From: "Steven M. Christey" <coley@...us.mitre.org> To: oss-security@...ts.openwall.com cc: coley@...re.org Subject: Re: CVE request: kernel: sunrpc: fix possible overrun on read of /proc/sys/sunrpc/transports ====================================================== Name: CVE-2008-3911 Status: Candidate URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3911 Reference: MLIST:[linux-kernel] 20080830 Re: buffer overflow in /proc/sys/sunrpc/transports Reference: URL:http://lkml.org/lkml/2008/8/30/184 Reference: MLIST:[linux-kernel] 20080830 buffer overflow in /proc/sys/sunrpc/transports Reference: URL:http://lkml.org/lkml/2008/8/30/140 Reference: MLIST:[oss-security] 20080904 CVE request: kernel: sunrpc: fix possible overrun on read of /proc/sys/sunrpc/transports Reference: URL:http://www.openwall.com/lists/oss-security/2008/09/04/2 Reference: CONFIRM:http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=27df6f25ff218072e0e879a96beeb398a79cdbc8 The proc_do_xprt function in net/sunrpc/sysctl.c in the Linux kernel 2.6.26.3 does not check the length of a certain buffer obtained from userspace, which allows local users to overflow a stack-based buffer and have unspecified other impact via a crafted read system call for the /proc/sys/sunrpc/transports file.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.