Tomas Henzl pointed out this bug in the ecryptfs mount path: > >> + options_len = (strlen(options) + 1); > >> + if ((opts_tmp = opts_orig = kmalloc(options_len, GFP_KERNEL)) == NULL) { > >> + rc = -ENOMEM; > >> + goto out; > >> + } > >> + memcpy(opts_orig, options, options_len); > >> + opts_orig[options_len] = '\0'; > >> > Sorry for being so late, but wouldn't be here better > > + opts_orig[options_len - 1] = '\0'; where it writes 1 byte past the allocated memory. This constitutes memory corruption on the ecryptfs mount path, and should be fixed before RHEL5.3 releases. Thanks, -Eric
This request was evaluated by Red Hat Product Management for inclusion in a Red Hat Enterprise Linux maintenance release. Product Management has requested further review of this request by Red Hat Engineering, for potential inclusion in a Red Hat Enterprise Linux Update release for currently deployed products. This request is not yet committed for inclusion in an Update release.
in kernel-2.6.18-118.el5 You can download this test kernel from http://people.redhat.com/dzickus/el5
An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on therefore solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHSA-2009-0225.html