First published: Wed Jan 11 2012(Updated: )
Commit ef14f0c1578dce4b688726eb2603e50b62d6665a introduced an integer overflow in the ACL handling code, which could further lead to heap-based buffer overflow via a crafted filesystem. Upstream commits: <a href="http://git.kernel.org/linus/fa8b18edd752a8b4e9d1ee2cd615b82c93cf8bba">http://git.kernel.org/linus/fa8b18edd752a8b4e9d1ee2cd615b82c93cf8bba</a> <a href="http://git.kernel.org/linus/093019cf1b18dd31b2c3b77acce4e000e2cbc9ce">http://git.kernel.org/linus/093019cf1b18dd31b2c3b77acce4e000e2cbc9ce</a> Both commits are needed to fix the vulnerability. The vulnerability seems to first appear in 2.6.32-rc1. 3.2 contains only the first commit. Acknowledgements: Red Hat would like to thank Wang Xi for reporting this issue.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux-2.6 | ||
Linux kernel | <3.1.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-0038 has a moderate severity rating due to the potential for heap-based buffer overflow resulting from an integer overflow in ACL handling.
To fix CVE-2012-0038, users should update to a patched version of the Linux kernel that addresses this vulnerability.
CVE-2012-0038 affects versions of the Linux Kernel up to 3.1.9.
An integer overflow in the context of CVE-2012-0038 occurs when a calculation produces a value that exceeds the maximum limit for an integer data type.
CVE-2012-0038 poses risks such as unauthorized access or system crashes due to a heap-based buffer overflow.