Bug 469652 - kernel: hfs: fix namelength memory corruption
kernel: hfs: fix namelength memory corruption
Status: CLOSED DUPLICATE of bug 470769
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
Depends On: 469795 469796 469797 469798 469799
  Show dependency treegraph
Reported: 2008-11-03 04:09 EST by Eugene Teo (Security Response)
Modified: 2008-11-13 05:13 EST (History)
10 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2008-11-13 05:13:18 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)
Upstream patch for this issue (1.28 KB, patch)
2008-11-03 04:19 EST, Eugene Teo (Security Response)
no flags Details | Diff

  None (edit)
Description Eugene Teo (Security Response) 2008-11-03 04:09:34 EST
Description of problem:
Eric Sesterhenn reported: Fix a stack corruption caused by a corrupted hfs filesystem.  If the catalog name length is corrupted the memcpy overwrites the catalog btree structure.  Since the field is limited to HFS_NAMELEN bytes in the
structure and the file format, we throw an error if it is too long.
Comment 2 Eugene Teo (Security Response) 2008-11-03 04:19:32 EST
Created attachment 322282 [details]
Upstream patch for this issue
Comment 6 Eugene Teo (Security Response) 2008-11-13 05:13:18 EST

*** This bug has been marked as a duplicate of bug 470769 ***

Note You need to log in before you can comment on or make changes to this bug.