Bug 677260 (CVE-2011-0711)
Summary: | CVE-2011-0711 kernel: xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1 | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Eugene Teo (Security Response) <eteo> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | arozansk, bhu, dchinner, dhoward, esandeen, jkacur, kernel-mgr, kmcmartin, lgoncalv, lwang, plougher, rkhan, rt-maint, rwheeler, tcallawa, vkrizan, williams |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2015-07-29 13:50:03 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 677265, 677266, 677267, 677268, 677269 | ||
Bug Blocks: |
Description
Eugene Teo (Security Response)
2011-02-14 09:00:44 UTC
Upstream commit: http://git.kernel.org/linus/3a3675b7f23f83ca8c67c9c2b6edf707fd28d1ba There's a bug in this commit, see "[PATCH] xfs: zero proper structure size for geometry calls" on the xfs list. But it is probably not going to affect x86_64 due to luck and padding... (In reply to comment #4) > There's a bug in this commit, see "[PATCH] xfs: zero proper structure size for > geometry calls" on the xfs list. But it is probably not going to affect x86_64 > due to luck and padding... Thanks for the heads-up! http://www.spinics.net/lists/xfs/msg03801.html (In reply to comment #5) > (In reply to comment #4) > > There's a bug in this commit, see "[PATCH] xfs: zero proper structure size for > > geometry calls" on the xfs list. But it is probably not going to affect x86_64 > > due to luck and padding... > > Thanks for the heads-up! > > http://www.spinics.net/lists/xfs/msg03801.html Version 3. http://www.spinics.net/lists/xfs/msg03806.html (In reply to comment #6) > > Version 3. http://www.spinics.net/lists/xfs/msg03806.html Now in upstream http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=af24ee9ea8d532e16883251a6684dfa1be8eec29 If I understand this correctly then, both commits are needed. 3a3675b7f23f83ca8c67c9c2b6edf707fd28d1ba and af24ee9ea8d532e16883251a6684dfa1be8eec29 Is this correct? (In reply to comment #8) > If I understand this correctly then, both commits are needed. > 3a3675b7f23f83ca8c67c9c2b6edf707fd28d1ba > and > af24ee9ea8d532e16883251a6684dfa1be8eec29 > > Is this correct? That is correct. Due to padding on 64-bit arches, rhel may actually be fine, since we only ship xfs with x86_64. Nothing wrong with including the 2nd patch but if it causes lots of last-minute exception work, we may be ok without it. (In reply to comment #10) > Due to padding on 64-bit arches, rhel may actually be fine, since we only ship > xfs with x86_64. > > Nothing wrong with including the 2nd patch but if it causes lots of last-minute > exception work, we may be ok without it. We ship XFS on the real-time kernel on both x86 and x86_64. Statement: This issue did not affect the version of Linux kernel as shipped with Red Hat Enterprise Linux 4 as it did not have support for the XFS file system. This has been addressed in Red Hat Enterprise Linux 5, 6, and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-0927.html, https://rhn.redhat.com/errata/RHSA-2011-0498.html, and https://rhn.redhat.com/errata/RHSA-2011-0500.html. This issue has been addressed in following products: MRG for RHEL-5 Via RHSA-2011:0500 https://rhn.redhat.com/errata/RHSA-2011-0500.html This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2011:0498 https://rhn.redhat.com/errata/RHSA-2011-0498.html This issue has been addressed in following products: Red Hat Enterprise Linux 5 Via RHSA-2011:0927 https://rhn.redhat.com/errata/RHSA-2011-0927.html |