Bug 749156 (CVE-2011-4077) - CVE-2011-4077 kernel: xfs: potential buffer overflow in xfs_readlink()
Summary: CVE-2011-4077 kernel: xfs: potential buffer overflow in xfs_readlink()
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2011-4077
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 694702 749159 749160 749161 749162 749166 761375
Blocks: 749153
TreeView+ depends on / blocked
 
Reported: 2011-10-26 10:43 UTC by Petr Matousek
Modified: 2021-02-24 14:22 UTC (History)
24 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2013-04-24 04:10:48 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2012:0007 0 normal SHIPPED_LIVE Important: kernel security, bug fix, and enhancement update 2012-01-11 01:02:46 UTC
Red Hat Product Errata RHSA-2012:0333 0 normal SHIPPED_LIVE Important: kernel-rt security and bug fix update 2012-02-24 01:21:35 UTC
Red Hat Product Errata RHSA-2012:0350 0 normal SHIPPED_LIVE Moderate: kernel security and bug fix update 2012-03-06 23:43:05 UTC

Description Petr Matousek 2011-10-26 10:43:24 UTC
A flaw was found in the way Linux kernel's XFS filesystem implementation handled links with pathname larger than MAXPATHLEN. When CONFIG_XFS_DEBUG configuration option was not enabled when compiling Linux kernel, an attacker able to mount malicious XFS image could use this flaw to crash the system, or potentially, elevate his privileges on that system.

Proposed upstream patch:
http://oss.sgi.com/archives/xfs/2011-10/msg00345.html

Comment 4 Petr Matousek 2011-10-26 10:50:47 UTC
Statement:

This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 4 as it did not include support for XFS filesystem. This has been addressed in Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2012-0007.html, https://rhn.redhat.com/errata/RHSA-2012-0350.html, and https://rhn.redhat.com/errata/RHSA-2012-0333.html.

Comment 5 Petr Matousek 2011-10-26 10:58:34 UTC
Created kernel tracking bugs for this issue

Affects: fedora-all [bug 749166]

Comment 8 errata-xmlrpc 2012-01-10 20:08:54 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5

Via RHSA-2012:0007 https://rhn.redhat.com/errata/RHSA-2012-0007.html

Comment 12 errata-xmlrpc 2012-02-23 20:23:07 UTC
This issue has been addressed in following products:

  MRG for RHEL-6 v.2

Via RHSA-2012:0333 https://rhn.redhat.com/errata/RHSA-2012-0333.html

Comment 13 errata-xmlrpc 2012-03-06 18:44:20 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 6

Via RHSA-2012:0350 https://rhn.redhat.com/errata/RHSA-2012-0350.html


Note You need to log in before you can comment on or make changes to this bug.