Bug 1735624 (CVE-2011-5327) - CVE-2011-5327 kernel: memory corruption in sunction tcm_loop_make_naa_tpg() in drivers/target/loopback/tcm_loop.c
Summary: CVE-2011-5327 kernel: memory corruption in sunction tcm_loop_make_naa_tpg() i...
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2011-5327
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1735625
Blocks: 1735626
TreeView+ depends on / blocked
 
Reported: 2019-08-01 07:35 UTC by Dhananjay Arunesh
Modified: 2021-02-16 21:34 UTC (History)
43 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in the Linux kernel’s implementation of SCSI loopback emulation, where an off by one in the drivers/target/loopback/tcm_loop.c tcm_loop_make_naa_tpg() function could result in memory corruption. A local attacker could abuse this flaw by corrupting memory on a system where this configuration is present.
Clone Of:
Environment:
Last Closed: 2019-08-07 02:44:37 UTC


Attachments (Terms of Use)

Description Dhananjay Arunesh 2019-08-01 07:35:45 UTC
A vulnerability was found in Linux Kernel, an off by one in the drivers/target/loopback/tcm_loop.c tcm_loop_make_naa_tpg() function could result in at least memory corruption.

Reference:
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=12f09ccb4612734a53e47ed5302e0479c10a50f8
https://github.com/torvalds/linux/commit/12f09ccb4612734a53e47ed5302e0479c10a50f8
https://mirrors.edge.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1

Comment 1 Dhananjay Arunesh 2019-08-01 07:36:26 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 1735625]

Comment 2 Justin M. Forbes 2019-08-01 12:31:58 UTC
This was fixed for Fedora in 2011.

Comment 4 Wade Mealing 2019-08-07 02:17:27 UTC
No shipping versions of Red Hat Enterprise Linux contain this flaw.

Comment 5 Wade Mealing 2019-08-07 02:18:10 UTC
This flaw is rated as important, it is basic memory corruption that may lead to additional paths of privilege escalation.


Note You need to log in before you can comment on or make changes to this bug.