diff options
author | Timo Warns <Warns@pre-sense.de> | 2011-05-19 09:24:17 +0200 |
---|---|---|
committer | Linus Torvalds <torvalds@linux-foundation.org> | 2011-05-20 16:40:36 -0700 |
commit | cae13fe4cc3f24820ffb990c09110626837e85d4 (patch) | |
tree | db3722f6c3ffc142eb3b931fb41b34d8dab3eaa7 /crypto | |
parent | e6c9366b2adb52cba64b359b3050200743c7568c (diff) | |
download | op-kernel-dev-cae13fe4cc3f24820ffb990c09110626837e85d4.zip op-kernel-dev-cae13fe4cc3f24820ffb990c09110626837e85d4.tar.gz |
Fix for buffer overflow in ldm_frag_add not sufficient
As Ben Hutchings discovered [1], the patch for CVE-2011-1017 (buffer
overflow in ldm_frag_add) is not sufficient. The original patch in
commit c340b1d64000 ("fs/partitions/ldm.c: fix oops caused by corrupted
partition table") does not consider that, for subsequent fragments,
previously allocated memory is used.
[1] http://lkml.org/lkml/2011/5/6/407
Reported-by: Ben Hutchings <ben@decadent.org.uk>
Signed-off-by: Timo Warns <warns@pre-sense.de>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
Diffstat (limited to 'crypto')
0 files changed, 0 insertions, 0 deletions