|
Message-ID: <4D6CB75F.5090303@redhat.com> Date: Tue, 01 Mar 2011 17:07:43 +0800 From: Eugene Teo <eugene@...hat.com> To: oss-security@...ts.openwall.com CC: "Steven M. Christey" <coley@...us.mitre.org> Subject: Re: CVE request - kernel: xfs infoleak On 02/16/2011 04:41 PM, Eugene Teo wrote: > From Dan R0s3nbug5, "The FSGEOMETRY_V1 ioctl (and its compat > equivalent) calls out to xfs_fs_geometry() with a version number of 3. > This code path does not fill in the logsunit member of the passed > xfs_fsop_geom_t, leading to the leaking of four bytes of uninitialized > stack data to potentially unprivileged callers. Since all other members > are filled in all code paths and there are no padding bytes in this > structure, it's safe to avoid an expensive memset() in favor of just > clearing this one field." > > https://patchwork.kernel.org/patch/555461/ > https://bugzilla.redhat.com/show_bug.cgi?id=677260 There's an issue with the patch, here's the fix to the fix: http://www.spinics.net/lists/xfs/msg03801.html Eugene -- Eugene Teo / Red Hat Security Response Team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.