Hide Forgot
A flaw was found in the way cifs handled iovecs with bogus pointers userland passed down via writev() during uncached writes. An unprivileged local user with access to cifs share could use this flaw to crash the system or leak kernel memory. Privilege escalation cannot be ruled out (since memory corruption is involved), but is unlikely. The default cache settings for cifs mounts on Red Hat Enterprise Linux prohibit successful exploitation of this issue. Acknowledgements: Red Hat would like to thank Al Viro for reporting this issue.
Patches have been reported to the linux-cifs mailing list: http://article.gmane.org/gmane.linux.kernel.cifs/9401 http://article.gmane.org/gmane.linux.kernel.cifs/9402 The CVE has not been mentioned in the patches, however. Only the first patch is required to fix the flaw. The second patch is to ensure that this does not get hit again in the future by adding extra protection.
kernel-3.12.11-201.fc19 has been pushed to the Fedora 19 stable repository. If problems still persist, please make note of it in this bug report.
kernel-3.13.3-201.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report.
Statement: This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 5.
This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2014:0328 https://rhn.redhat.com/errata/RHSA-2014-0328.html
This issue has been addressed in following products: MRG for RHEL-6 v.2 Via RHSA-2014:0439 https://rhn.redhat.com/errata/RHSA-2014-0439.html