First published: Tue Mar 12 2013(Updated: )
ext3_msg() takes the printk prefix as the second parameter and the format string as the third parameter. Two callers of ext3_msg omit the prefix and pass the format string as the second parameter and the first parameter to the format string as the third parameter. In both cases this string comes from an arbitrary source. An user able to mount ext3 filesystems could use this flaw to crash the system or, potentially, increase their privileges. Upstream fix: <a href="http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8d0c2d10dd72c5292eda7a06231056a4c972e4cc">http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8d0c2d10dd72c5292eda7a06231056a4c972e4cc</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <=3.8.3 | |
Linux Kernel | =3.8.0 | |
Linux Kernel | =3.8.1 | |
Linux Kernel | =3.8.2 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.17-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-1848 has been classified with a moderate severity due to potential information leaks.
To fix CVE-2013-1848, update to a patched version of the Linux kernel, such as 5.10.223-1 or later.
CVE-2013-1848 affects Linux Kernel versions up to and including 3.8.3.
CVE-2013-1848 is a formatting string vulnerability due to incorrect parameter usage in the ext3_msg() function.
CVE-2013-1848 may not be present in all Linux distributions; it specifically affects those using the vulnerable Linux kernel versions.