First published: Mon Nov 12 2018(Updated: )
A security flaw was found in the Linux kernel in a way that the cleancache subsystem clears an inode after the final file truncation (removal). The new file created with the same inode may contain leftover pages from cleancache and so the old file data instead of the new one. References: <a href="https://seclists.org/oss-sec/2018/q4/169">https://seclists.org/oss-sec/2018/q4/169</a> A suggested patch: <a href="https://lore.kernel.org/patchwork/patch/1011367/">https://lore.kernel.org/patchwork/patch/1011367/</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <=4.14 | |
Red Hat Enterprise Linux | =7.0 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Debian Linux | =8.0 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.133-1 6.12.22-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-16862 is considered to be a medium severity vulnerability due to its potential to expose old file data.
To fix CVE-2018-16862, update the Linux kernel to versions 5.10.223-1, 5.10.226-1, 6.1.123-1, 6.1.119-1, 6.12.11-1, or 6.12.12-1, or apply patches provided by your OS vendor.
CVE-2018-16862 affects the Linux kernel versions up to 4.14 as well as specific versions of Red Hat Enterprise Linux, Ubuntu Linux, and Debian GNU/Linux.
The potential impacts of CVE-2018-16862 include unintended data exposure where new files might contain data remnants from previously truncated files.
More information about CVE-2018-16862 can be found in security advisories from your OS vendor and security databases.