First published: Tue Aug 04 2015(Updated: )
A flaw was found in the Linux kernels function path_openat() in which would incorrectly clear up twice (as part of path_lookupat() called by do_tmpfile(). Doing so again can lead to double fput(). This can lead to a use-after free condition. CVE assignment: <a href="http://seclists.org/oss-sec/2015/q3/270">http://seclists.org/oss-sec/2015/q3/270</a> Introduced in this commit: <a href="http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=bb458c644a59dbba3a1fe59b27106c5e68e1c4bd">http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=bb458c644a59dbba3a1fe59b27106c5e68e1c4bd</a> Upstream patch: <a href="http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f15133df088ecadd141ea1907f2c96df67c729f0">http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f15133df088ecadd141ea1907f2c96df67c729f0</a> OSS-SEC request: <a href="http://seclists.org/oss-sec/2015/q3/371">http://seclists.org/oss-sec/2015/q3/371</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | >=3.0<=3.19.8 | |
Linux Linux kernel | >=4.0<4.0.4 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
Google Android | ||
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.11.10-1 6.12.5-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.