First published: Thu Jun 04 2015(Updated: )
Linux kernel built with the UDF file system(CONFIG_UDF_FS) support is vulnerable to a crash. It could occur while reading from a corrupted/malicious udf file system image. An unprivileged user could use this flaw to crash the kernel resulting in DoS. Upstream fixes: --------------- -> <a href="https://git.kernel.org/linus/e159332b9af4b04d882dbcfe1bb0117f0a6d4b58">https://git.kernel.org/linus/e159332b9af4b04d882dbcfe1bb0117f0a6d4b58</a> -> <a href="https://git.kernel.org/linus/e237ec37ec154564f8690c5bd1795339955eeef9">https://git.kernel.org/linus/e237ec37ec154564f8690c5bd1795339955eeef9</a> -> <a href="https://git.kernel.org/linus/a1d47b262952a45aae62bd49cfaf33dd76c11a2c">https://git.kernel.org/linus/a1d47b262952a45aae62bd49cfaf33dd76c11a2c</a> Reference: ---------- -> <a href="http://www.openwall.com/lists/oss-security/2015/06/03/14">http://www.openwall.com/lists/oss-security/2015/06/03/14</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Kernel-devel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1228229 is significant as it can lead to a denial of service (DoS) through kernel crashes from unprivileged users.
To fix REDHAT-BUG-1228229, you should update the Linux kernel to the latest version that contains the upstream patches addressing this vulnerability.
Any system running the Linux kernel with UDF file system support enabled is affected by REDHAT-BUG-1228229.
The potential consequences of REDHAT-BUG-1228229 include kernel crashes and denial of service, impacting system availability.
There is no specific workaround for REDHAT-BUG-1228229, so applying security patches is recommended for affected systems.