First published: Wed Feb 12 2014(Updated: )
A flaw was found in the way cifs handled iovecs with bogus pointers userland passed down via writev() during uncached writes. An unprivileged local user with access to cifs share could use this flaw to crash the system or leak kernel memory. Privilege escalation cannot be ruled out (since memory corruption is involved), but is unlikely. The default cache settings for cifs mounts on Red Hat Enterprise Linux prohibit successful exploitation of this issue. Acknowledgements: Red Hat would like to thank Al Viro for reporting this issue.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | <=3.13.5 | |
SUSE Linux Enterprise Desktop | =11-sp3 | |
SUSE Linux Enterprise Server | =11 | |
SUSE Linux Enterprise Server | =11-sp3 | |
Suse Linux Enterprise Server | =11-sp3 | |
Redhat Enterprise Linux Desktop | =6.0 | |
Redhat Enterprise Linux Eus | =6.5 | |
Redhat Enterprise Linux Server | =6.0 | |
Redhat Enterprise Linux Server Aus | =6.5 | |
Redhat Enterprise Linux Server Tus | =6.5 | |
Redhat Enterprise Linux Workstation | =6.0 | |
Linux Linux kernel | <3.2.57 | |
Linux Linux kernel | >=3.3<3.4.83 | |
Linux Linux kernel | >=3.5<3.10.33 | |
Linux Linux kernel | >=3.11<3.12.14 | |
Linux Linux kernel | >=3.13<3.13.6 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.112-1 6.11.5-1 6.11.7-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.