Bug 469652

Summary: kernel: hfs: fix namelength memory corruption
Product: [Other] Security Response Reporter: Eugene Teo (Security Response) <eteo>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED DUPLICATE QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: anton, bhu, dhoward, dzickus, jpirko, lgoncalv, lwang, vgoyal, vmayatsk, williams
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2008-11-13 10:13:18 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 469795, 469796, 469797, 469798, 469799    
Bug Blocks:    
Attachments:
Description Flags
Upstream patch for this issue none

Description Eugene Teo (Security Response) 2008-11-03 09:09:34 UTC
Description of problem:
Eric Sesterhenn reported: Fix a stack corruption caused by a corrupted hfs filesystem.  If the catalog name length is corrupted the memcpy overwrites the catalog btree structure.  Since the field is limited to HFS_NAMELEN bytes in the
structure and the file format, we throw an error if it is too long.

Comment 2 Eugene Teo (Security Response) 2008-11-03 09:19:32 UTC
Created attachment 322282 [details]
Upstream patch for this issue

Comment 6 Eugene Teo (Security Response) 2008-11-13 10:13:18 UTC

*** This bug has been marked as a duplicate of bug 470769 ***