First published: Wed Jan 11 2012(Updated: )
Commit ef14f0c1578dce4b688726eb2603e50b62d6665a introduced an integer overflow in the ACL handling code, which could further lead to heap-based buffer overflow via a crafted filesystem. Upstream commits: <a href="http://git.kernel.org/linus/fa8b18edd752a8b4e9d1ee2cd615b82c93cf8bba">http://git.kernel.org/linus/fa8b18edd752a8b4e9d1ee2cd615b82c93cf8bba</a> <a href="http://git.kernel.org/linus/093019cf1b18dd31b2c3b77acce4e000e2cbc9ce">http://git.kernel.org/linus/093019cf1b18dd31b2c3b77acce4e000e2cbc9ce</a> Both commits are needed to fix the vulnerability. The vulnerability seems to first appear in 2.6.32-rc1. 3.2 contains only the first commit. Acknowledgements: Red Hat would like to thank Wang Xi for reporting this issue.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | <3.1.9 | |
debian/linux-2.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.