First published: Wed Nov 22 2017(Updated: )
A flaw was found in the patches used to fix the 'dirtycow' vulnerability <a href="https://access.redhat.com/security/cve/CVE-2016-5195">CVE-2016-5195</a>). The touch_pmd() function can be accessed by get_user_pages(). In this case, the pmd will become dirty without going through the Copy On Write cycle. In the simplest example, a large page that is read-only can be modified, including page 0 of a processes virtual address space. Upstream patch: <a href="https://github.com/torvalds/linux/commit/a8f97366452ed491d13cf1e44241bc0b5740b1f0">https://github.com/torvalds/linux/commit/a8f97366452ed491d13cf1e44241bc0b5740b1f0</a> Vulnerability announcement: <a href="http://www.openwall.com/lists/oss-security/2017/11/30/1">http://www.openwall.com/lists/oss-security/2017/11/30/1</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | >=3.2.87<3.3 | |
Linux Linux kernel | >=3.10.106<3.11 | |
Linux Linux kernel | >=3.12.73<3.13 | |
Linux Linux kernel | >=3.16.42<3.16.52 | |
Linux Linux kernel | >=3.18.55<3.18.86 | |
Linux Linux kernel | >=4.1.41<4.1.48 | |
Linux Linux kernel | >=4.4.70<4.4.104 | |
Linux Linux kernel | >=4.9.7<4.9.67 | |
Linux Linux kernel | >=4.10<4.14.4 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.11.10-1 6.12.5-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.