Bug 1735624 (CVE-2011-5327)
Summary: | CVE-2011-5327 kernel: memory corruption in sunction tcm_loop_make_naa_tpg() in drivers/target/loopback/tcm_loop.c | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Dhananjay Arunesh <darunesh> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED NOTABUG | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | acaringi, airlied, bhu, blc, brdeoliv, bskeggs, dhoward, dvlasenk, esammons, fhrbata, hdegoede, hkrzesin, iboverma, ichavero, itamar, jarodwilson, jeremy, jforbes, jglisse, jlelli, john.j5live, jonathan, josef, jross, jshortt, jstancek, jwboyer, kernel-maint, kernel-mgr, labbott, lgoncalv, linville, matt, mchehab, mcressma, mjg59, mlangsdo, nmurray, plougher, rt-maint, rvrbovsk, steved, williams |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: |
A flaw was found in the Linux kernel’s implementation of SCSI loopback emulation, where an off by one in the drivers/target/loopback/tcm_loop.c tcm_loop_make_naa_tpg() function could result in memory corruption. A local attacker could abuse this flaw by corrupting memory on a system where this configuration is present.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2019-08-07 02:44:37 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1735625 | ||
Bug Blocks: | 1735626 |
Description
Dhananjay Arunesh
2019-08-01 07:35:45 UTC
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1735625] This was fixed for Fedora in 2011. No shipping versions of Red Hat Enterprise Linux contain this flaw. This flaw is rated as important, it is basic memory corruption that may lead to additional paths of privilege escalation. |