First published: Fri Jan 07 2011(Updated: )
Verify that the total length of the iovec returned in FUSE_IOCTL_RETRY doesn't overflow iov_length(). Upstream commit: <a href="http://git.kernel.org/linus/7572777eef78ebdee1ecb7c258c0ef94d35bad16">http://git.kernel.org/linus/7572777eef78ebdee1ecb7c258c0ef94d35bad16</a> Introduced in 59efec7b v2.6.29-rc1 long fuse_do_ioctl(struct file *file, unsigned int cmd, unsigned long arg, unsigned int flags) { [...] /* did it ask for retry? */ if (outarg.flags & FUSE_IOCTL_RETRY) { [...] /* no retry if in restricted mode */ err = -EIO; if (!(flags & FUSE_IOCTL_UNRESTRICTED)) goto out; [...] in_iov = page_address(iov_page); out_iov = in_iov + in_iovs; So this affects unrestricted ioctl that is used by CUSE. Others use restricted ioctl. On Red Hat Enterprise Linux 6, /dev/cuse is root-owned by default. crw-rw----. 1 root root 10, 57 Jan 7 06:51 /dev/cuse
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Kernel-devel | >=2.6.29-rc1 | |
Red Hat Enterprise Linux |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-667892 is categorized as moderate.
To fix REDHAT-BUG-667892, update your Linux kernel to a patched version that addresses the overflow issue.
REDHAT-BUG-667892 affects the Linux kernel version 2.6.29-rc1 and above.
As of now, there are no publicly known exploits specifically targeting REDHAT-BUG-667892.
REDHAT-BUG-667892 was introduced in the kernel version 59efec7b.