First published: Mon Nov 18 2013(Updated: )
Commit 1f1ea6c (included in Red Hat Enterprise Linux 6 as part of <a href="https://access.redhat.com/security/cve/CVE-2012-2375">CVE-2012-2375</a> fix) accidently dropped the checking for too small result buffer length. If someone uses getxattr on "system.nfs4_acl" on an NFSv4 mount supporting ACLs, the ACL has not been cached and the buffer suplied is too short, we still copy the complete ACL, resulting in kernel and user space memory corruption. Introduced by: <a href="http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1f1ea6c2d9d8c0be9ec56454b05315273b5de8ce">http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1f1ea6c2d9d8c0be9ec56454b05315273b5de8ce</a> Upstream commit: <a href="http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7d3e91a89b7adbc2831334def9e494dd9892f9af">http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7d3e91a89b7adbc2831334def9e494dd9892f9af</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Enterprise Linux | ||
Red Hat Kernel-devel | >=unknown<=6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1031678 is categorized as a medium vulnerability due to potential buffer overflow risks.
To fix REDHAT-BUG-1031678, ensure that your system is updated to the latest version of Red Hat Enterprise Linux 6 that addresses this issue.
REDHAT-BUG-1031678 affects Red Hat Enterprise Linux 6 and Linux Kernel versions up to 6.
The primary cause of REDHAT-BUG-1031678 is the accidental omission of buffer length checks in a specific commit.
Yes, a public reference for REDHAT-BUG-1031678 can be found in the Red Hat Bugzilla and security advisories.