First published: Fri May 31 2013(Updated: )
A flaw was found in the way certain disk names were interpreted by the Linux kernel. Block layer uses the "disk_name" field as a format string in a number of places. While this is normally not a problem due to how disk names are created (statically or incrementally), there is currently at least one way to define nearly arbitrary names via md. A privileged (uid 0) local user could potentially use this flaw to execute code at ring0. Acknowledgements: Red Hat would like to thank Kees Cook for reporting this issue.
Credit: chrome-cve-admin@google.com cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <=3.9.4 | |
Linux Kernel | =3.9-rc1 | |
Linux Kernel | =3.9-rc2 | |
Linux Kernel | =3.9-rc3 | |
Linux Kernel | =3.9-rc4 | |
Linux Kernel | =3.9-rc5 | |
Linux Kernel | =3.9-rc6 | |
Linux Kernel | =3.9-rc7 | |
Linux Kernel | =3.9.0 | |
Linux Kernel | =3.9.1 | |
Linux Kernel | =3.9.2 | |
Linux Kernel | =3.9.3 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.133-1 6.12.22-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-2851 has a medium severity rating due to its potential to cause local denial of service.
To fix CVE-2013-2851, upgrade to a Linux kernel version above 3.9.4 or apply appropriate security patches.
CVE-2013-2851 affects Linux kernel versions up to 3.9.4, including various release candidates of version 3.9.
CVE-2013-2851 could allow an attacker to exploit improper disk name handling resulting in a denial of service.
System administrators using affected versions of the Linux kernel should prioritize patching against CVE-2013-2851.