The __do_follow_link function in fs/namei.c in the Linux kernel before 2.6.33 does not properly handle the last pathname component during use of certain filesystems, which allows local users to cause a denial of service (incorrect free operations and system crash) via an open system call.
References
Link | Resource |
---|---|
https://github.com/torvalds/linux/commit/86acdca1b63e6890540fa19495cfc708beff3d8b | Patch Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1094363 | Exploit Issue Tracking Patch Third Party Advisory |
http://mirror.linux.org.au/linux/kernel/v2.6/ChangeLog-2.6.33 | Broken Link |
http://secunia.com/advisories/59406 | Broken Link |
http://linux.oracle.com/errata/ELSA-2014-0771.html | Third Party Advisory |
http://linux.oracle.com/errata/ELSA-2014-3043.html | Third Party Advisory |
http://secunia.com/advisories/59309 | Broken Link |
http://secunia.com/advisories/59262 | Broken Link |
http://secunia.com/advisories/59560 | Broken Link |
http://www.securityfocus.com/bid/68125 | Third Party Advisory VDB Entry |
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=86acdca1b63e6890540fa19495cfc708beff3d8b |
Information
Published : 2014-06-23 04:21
Updated : 2023-02-12 16:37
NVD link : CVE-2014-0203
Mitre link : CVE-2014-0203
JSON object : View
CWE
CWE-416
Use After Free
Products Affected
linux
- linux_kernel
oracle
- linux