First published: Mon Jun 20 2011(Updated: )
Description of problem: The huge_memory.c THP page fault was allowed to run if vm_ops was null (which would succeed for /dev/zero MAP_PRIVATE, as the f_op->mmap wouldn't setup a special vma->vm_ops and it would fallback to regular anonymous memory) but other THP logics weren't fully activated for vmas with vm_file not NULL (/dev/zero has a not NULL vma->vm_file). Unprivileged local user could use this flaw to crash the server. Upstream patch: 78f11a255749d09025f54d4e2df4fbcb031530e2 References: <a href="https://bugzilla.kernel.org/show_bug.cgi?id=33682">https://bugzilla.kernel.org/show_bug.cgi?id=33682</a> <a href="http://www.spinics.net/lists/stable-commits/msg11762.html">http://www.spinics.net/lists/stable-commits/msg11762.html</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux-2.6 | ||
Linux kernel | <2.6.39 | |
Linux Kernel | <2.6.39 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-2479 is classified as a medium severity vulnerability affecting the Linux kernel.
To address CVE-2011-2479, upgrade the Linux kernel to version 2.6.39 or later.
CVE-2011-2479 affects Linux kernel versions prior to 2.6.39, particularly in Debian-based systems.
CVE-2011-2479 can be exploited through specially crafted user memory operations allowing unauthorized access.
CVE-2011-2479 was reported in June 2011 during security assessments of the Linux kernel.