First published: Fri Dec 11 2015(Updated: )
A patch was posted to fix an issue regarding unkillable task eating CPU. The problem is in the fuse_fill_write_pages() function. When a user calls the sys_writev syscall with specially crafted sequence of iovs the kernel function may never terminate and continue in a tight loop, the process is unable to be killed. Introduced in commit ea9b9907b82a09bd1a708004454f7065de77c5b0 Fixed in commit 3ca8138f014a913f98e6ef40e939868e1e9ea876 Upstream patch: <a href="https://lkml.org/lkml/2015/10/12/329">https://lkml.org/lkml/2015/10/12/329</a>
Credit: security@debian.org security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | <4.4 | |
Linux Linux kernel | =4.4-rc1 | |
Linux Linux kernel | =4.4-rc2 | |
Linux Linux kernel | =4.4-rc3 | |
Linux Linux kernel | =4.4-rc4 | |
Suse Linux Enterprise Real Time Extension | =12-sp1 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.112-1 6.11.5-1 6.11.7-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2015-8785.
The severity level of CVE-2015-8785 is low.
CVE-2015-8785 allows local users to cause a denial of service (infinite loop) via a writev system call that triggers a zero length for the first segment of an iov.
The Linux kernel versions before 4.4 are affected by CVE-2015-8785.
To fix CVE-2015-8785, update your Linux kernel version to 4.4 or later.