First published: Wed Nov 22 2017(Updated: )
A flaw was found in the patches used to fix the 'dirtycow' vulnerability <a href="https://access.redhat.com/security/cve/CVE-2016-5195">CVE-2016-5195</a>). The touch_pmd() function can be accessed by get_user_pages(). In this case, the pmd will become dirty without going through the Copy On Write cycle. In the simplest example, a large page that is read-only can be modified, including page 0 of a processes virtual address space. Upstream patch: <a href="https://github.com/torvalds/linux/commit/a8f97366452ed491d13cf1e44241bc0b5740b1f0">https://github.com/torvalds/linux/commit/a8f97366452ed491d13cf1e44241bc0b5740b1f0</a> Vulnerability announcement: <a href="http://www.openwall.com/lists/oss-security/2017/11/30/1">http://www.openwall.com/lists/oss-security/2017/11/30/1</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=3.2.87<3.3 | |
Linux Kernel | >=3.10.106<3.11 | |
Linux Kernel | >=3.12.73<3.13 | |
Linux Kernel | >=3.16.42<3.16.52 | |
Linux Kernel | >=3.18.55<3.18.86 | |
Linux Kernel | >=4.1.41<4.1.48 | |
Linux Kernel | >=4.4.70<4.4.104 | |
Linux Kernel | >=4.9.7<4.9.67 | |
Linux Kernel | >=4.10<4.14.4 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.17-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-1000405 has been classified as a moderate severity vulnerability due to its potential impact on Linux Kernel security.
To fix CVE-2017-1000405, update your Linux Kernel to a version that includes the security patches addressing this vulnerability.
CVE-2017-1000405 affects various versions of the Linux Kernel, specifically those between 3.2.87 and 4.14.4.
Yes, CVE-2017-1000405 is a flaw found in the patches that were implemented to fix the earlier CVE-2016-5195 'dirtycow' vulnerability.
The potential impact of CVE-2017-1000405 includes unauthorized access to system resources and possible data breaches.