The nfs_can_extend_write function in fs/nfs/write.c in the Linux kernel before 3.13.3 relies on a write delegation to extend a write operation without a certain up-to-date verification, which allows local users to obtain sensitive information from kernel memory in opportunistic circumstances by writing to a file in an NFS filesystem and then reading the same file.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://www.ubuntu.com/usn/USN-2137-1 | third party advisory vendor advisory |
http://www.ubuntu.com/usn/USN-2140-1 | third party advisory vendor advisory |
https://github.com/torvalds/linux/commit/263b4509ec4d47e0da3e753f85a39ea12d1eff24 | third party advisory patch |
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=263b4509ec4d47e0da3e753f85a39ea12d1eff24 | |
http://www.openwall.com/lists/oss-security/2014/02/20/16 | third party advisory mailing list |
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.13.3 | release notes vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1066939 | issue tracking third party advisory patch |