Commit ef14f0c1578dce4b688726eb2603e50b62d6665a introduced an integer overflow in the ACL handling code, which could further lead to heap-based buffer overflow via a crafted filesystem. Upstream commits: http://git.kernel.org/linus/fa8b18edd752a8b4e9d1ee2cd615b82c93cf8bba http://git.kernel.org/linus/093019cf1b18dd31b2c3b77acce4e000e2cbc9ce Both commits are needed to fix the vulnerability. The vulnerability seems to first appear in 2.6.32-rc1. 3.2 contains only the first commit. Acknowledgements: Red Hat would like to thank Wang Xi for reporting this issue.
Created kernel tracking bugs for this issue Affects: fedora-all [bug 782682]
This issue has been addressed in following products: MRG for RHEL-6 v.2 Via RHSA-2012:0333 https://rhn.redhat.com/errata/RHSA-2012-0333.html
This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2012:0350 https://rhn.redhat.com/errata/RHSA-2012-0350.html
Statement: This issue did not affect the Linux kernel as shipped with Red Hat Enterprise Linux 4 as it did not have support for the XFS file system. It did not affect the Linux kernel as shipped with Red Hat Enterprise Linux 5 as it did not backport the upstream commit ef14f0c1 that introduced the vulnerability. This has been addressed in Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2012-0350.html, and https://rhn.redhat.com/errata/RHSA-2012-0333.html.
This issue has been addressed in following products: Red Hat Enterprise Linux 6.1 EUS - Server Only Via RHSA-2012:1042 https://rhn.redhat.com/errata/RHSA-2012-1042.html