Bug 470769 - (CVE-2008-5025) CVE-2008-5025 kernel: hfs: fix namelength memory corruption
CVE-2008-5025 kernel: hfs: fix namelength memory corruption
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
: Security
: 469652 (view as bug list)
Depends On: 470770 470771 470772 470773
  Show dependency treegraph
Reported: 2008-11-10 00:52 EST by Eugene Teo (Security Response)
Modified: 2010-12-23 19:32 EST (History)
7 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2010-12-23 19:32:44 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)
Proposed upstream patch (1.28 KB, patch)
2008-11-10 00:54 EST, Eugene Teo (Security Response)
no flags Details | Diff

  None (edit)
Description Eugene Teo (Security Response) 2008-11-10 00:52:44 EST
From: Eric Sesterhenn: Fix a stack corruption caused by a corrupted hfs filesystem.  If the catalog name length is corrupted the memcpy overwrites the catalog btree structure.  Since the field is limited to HFS_NAMELEN bytes in the
structure and the file format, we throw an error if it is too long.
Comment 2 Eugene Teo (Security Response) 2008-11-10 00:54:22 EST
Created attachment 323040 [details]
Proposed upstream patch
Comment 6 Eugene Teo (Security Response) 2008-11-13 05:13:18 EST
*** Bug 469652 has been marked as a duplicate of this bug. ***
Comment 7 Fedora Update System 2009-01-07 04:17:53 EST
kernel- has been pushed to the Fedora 8 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 10 Vincent Danen 2010-12-23 19:32:44 EST
This was addressed via:

Red Hat Enterprise Linux version 4 (RHSA-2009:0014)
Red Hat Enterprise Linux version 5 (RHSA-2009:0264)

Note You need to log in before you can comment on or make changes to this bug.