First published: Fri Jan 30 2015(Updated: )
A specially crafted user space application may exploit a bug in handle_to_path to copy additional data to a target application. This defect is caused by the kernel incorrectly assuming that the arguments provided do not change. This is problematic since the kernel does size verifications only after the first read, so if the number of extra bytes changes in userspace between the first and second calls, we'll have an incoherent view of file_handle. The fix is to read the size once, and copy that over to the final structure referencing it from that point rather than the value from the application which may change. The patch is not yet present in official kernel tree: <a href="http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/log/fs/fhandle.c">http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/log/fs/fhandle.c</a> Proposed Patch: <a href="http://marc.info/?l=linux-kernel&m=142247707318982&w=2">http://marc.info/?l=linux-kernel&m=142247707318982&w=2</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Debian Debian Linux | =7.0 | |
Linux Linux kernel | <=3.18.9 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.11.10-1 6.12.5-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.