Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <490EC9AF.2080303@redhat.com>
Date: Mon, 03 Nov 2008 17:51:43 +0800
From: Eugene Teo <eteo@...hat.com>
To: oss-security@...ts.openwall.com
CC: "Steven M. Christey" <coley@...us.mitre.org>, Greg KH <greg@...ah.com>
Subject: CVE requests: kernel: hfsplus-related bugs

These were committed in upstream kernel. Reported by Eric Sesterhenn.

1) hfsplus: fix Buffer overflow with a corrupted image
Upstream commit: efc7ffcb4237f8cb9938909041c4ed38f6e1bf40

When an hfsplus image gets corrupted it might happen that the catalog
namelength field gets b0rked.  If we mount such an image the memcpy() in
hfsplus_cat_build_key_uni() writes more than the 255 that fit in the
name field.  Depending on the size of the overwritten data, we either
only get memory corruption or also trigger an oops.

2) hfsplus: check read_mapping_page() return value
Upstream commit: 649f1ee6c705aab644035a7998d7b574193a598a

The return value of read_mapping_page() is passed on to kmap unchecked.
 The bug is triggered after the first read_mapping_page() in
hfsplus_block_allocate(), this patch fixes all three usages in this
functions but leaves the ones further down in the file unchanged. This
was triggered by mounting an intentionally corrupted image.

These bugs need CVE names.

Thanks, Eugene

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.