Some vulnerabilities have been reported in the Linux kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and gain knowledge of potentially sensitive information.
1) An error in the "nfs_get_user_pages()" function due to insufficient checks on the return value returned by the "get_user_pages()" function can be exploited to cause a local DoS by performing an O_DIRECT write to an NFS file where the user buffer starts with a valid mapped page, but also contains an unmapped page.
2) Missing checks for bad elf entry addresses can be exploited to cause an endless recursive fault on Intel systems, which results in a local DoS.
3) The "sys_mbind()" function in "/mm/mempolicy.c" does not sanity check its arguments before passing it to the "get_nodes()" function. This can potentially be exploited to cause a local DoS.
An error in the XFS "ftruncate()" function, which may expose stale data off disk to users, has also been reported.
4) A race condition in the "sys_add_key()", "sys_request_key()", and "keyctl()" functions in "/security/keys/keyctl.c" can potentially be exploited by local users to either crash the kernel or read random parts of kernel memory by modifying the length of string arguments after the kernel has determined their length, but before the kernel copied them into kernel memory.
The vulnerability has been reported in versions prior to 220.127.116.11.
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to firstname.lastname@example.org
Subject: Linux Kernel Local Denial of Service and Information Disclosure
No posts yet
You must be logged in to post a comment.
Secunia Customer Login
Not a customer already?
Learn more about how our market leading Vulnerability Management solutions can help you manage risk and ensure compliance.