Multiple integer overflows, leading to heap-based buffer overflows were found in the way hardlink, the tool for consolidation of duplicate files via hardlinks performed string lengths concatenation in the calculation of the required memory space to be used. A remote attacker could provide a specially-crafted directory tree (with long directory and / or file names), and trick the local user into consolidating it, leading to hardlink executable crash, or, potentially arbitrary code execution with the privileges of the user running the hardlink executable. References: [1] http://www.openwall.com/lists/oss-security/2011/10/15/2 [2] https://bugs.gentoo.org/show_bug.cgi?id=387269 [3] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=645516 Proposed patch (applied by the Owl Linux distribution): [4] http://cvsweb.openwall.com/cgi/cvsweb.cgi/Owl/packages/hardlink/hardlink.c.diff?r1=1.2;r2=1.3
These issues affect the versions of the hardlink package, as shipped with Fedora release of 14 and 15. Please schedule an update.
Created hardlink tracking bugs for this issue Affects: fedora-all [bug 746715]
These issues affect the versions of the hardlink package, as shipped with Red Hat Enterprise Linux 5 and 6.
The CVE identifier of CVE-2011-3631 has been assigned to this issue: [5] http://www.openwall.com/lists/oss-security/2011/10/20/6
hardlink-1.0-12.fc16 has been pushed to the Fedora 16 stable repository. If problems still persist, please make note of it in this bug report.
hardlink-1.0-12.fc15 has been pushed to the Fedora 15 stable repository. If problems still persist, please make note of it in this bug report.