First published: Wed Jul 23 2014(Updated: )
A flaw was found in the way reference counting was handled in the Linux kernel's VFS subsystem when unmount on symlink was performed. On Red Hat Enterprise Linux 6 an unprivileged local user could use this flaw to cause OOM conditions leading to denial of service or, potentially, trigger use-after-free error. On Red Hat Enterprise Linux 7 a privileged local user with CAP_SYS_ADMIN capability (also in a container) could use this flaw to cause OOM conditions leading to denial of service or, potentially, trigger use-after-free error. Acknowledgements: Red Hat would like to thank Vasily Averin of Parallels for reporting this issue.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Enterprise Linux | ||
Red Hat Enterprise Linux |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1122472 is considered high due to the potential for denial of service and use-after-free vulnerabilities.
To fix REDHAT-BUG-1122472, you should apply the necessary patches provided by Red Hat for your specific version of Red Hat Enterprise Linux.
REDHAT-BUG-1122472 affects unprivileged local users on Red Hat Enterprise Linux 6 and 7 systems.
The risks associated with REDHAT-BUG-1122472 include potential out-of-memory conditions and possible denial of service.
Currently, there is no recommended workaround for REDHAT-BUG-1122472 aside from applying the available security patches.