First published: Fri Nov 27 2015(Updated: )
An information leak vulnerability was found when truncating a file to a smaller size which consists of an inline extent that is compressed. The data between the new file size and the old file size were not discarded, wasting metadata space and allowing for the truncated data to be leaked and the data corruption/loss to occur. The number of bytes used by the inode were not correctly decremented, which gives wrong report for callers of the stat(2) syscall. It is possible for a caller of the clone ioctl to actually read the data that was truncated, allowing for a security breach without requiring root access to the system, using only standard filesystem operations. Upstream patch (includes reproducing steps): <a href="https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0305cd5f7fca85dae392b9ba85b116896eb7c1c7">https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0305cd5f7fca85dae392b9ba85b116896eb7c1c7</a> CVE request: <a href="http://seclists.org/oss-sec/2015/q4/391">http://seclists.org/oss-sec/2015/q4/391</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | <=4.3.2 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.11.10-1 6.12.5-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2015-8374.
CVE-2015-8374 has a severity level of medium.
CVE-2015-8374 allows local users to obtain sensitive pre-truncation information from a file via a clone action in the Linux kernel.
The following versions of Ubuntu are affected by CVE-2015-8374: 3.2.0-98.138, 3.13.0-77.121, 3.19.0-49.55, 4.2.0-27.32, and 4.4~.
You can find more information about CVE-2015-8374 at the following references: [Reference 1](https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0305cd5f7fca85dae392b9ba85b116896eb7c1c7), [Reference 2](http://seclists.org/oss-sec/2015/q4/391), [Reference 3](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1286262).