Bugzilla – Bug 947732
VUL-0: CVE-2015-7312: kernel-source: Use-after-free in Linux kernel with aufs mmap patch
Last modified: 2016-09-06 16:19:41 UTC
CVE-2015-7312 from OSS-security list: " The aufs (Advanced Union Filesystem) project provides an optional patch for the Linux kernel, called either aufs3-mmap.patch or aufs4-mmap.patch, which is needed to ensure correct behaviour of memory-mapped files from an aufs mount. Each memory mapping (vma) holds a reference to the file that is mapped. This patch makes it also hold a reference to the virtual file on the union mount through which the file was found, where applicable. In two functions, madvise_remove() and sys_msync(), it is necessary to take an extra reference to the mapped file before unlocking the current memory management state, as the vma may be freed after that point. Unfortunately the aufs patch introduces later uses of the vma, resulting in a potential use-after-free. This is certainly exploitable for a minor denial of service (BUG in process context, so the task can't be cleaned up properly but the system does not panic) but might also be usable for privilege escalation. I posted a patch here that works for me: http://sourceforge.net/p/aufs/mailman/message/34449209/ " References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-7312 http://seclists.org/oss-sec/2015/q3/620 http://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-7312.html http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7312
bugbot adjusting priority
Do we support aufs in any our products...?
I've found only references to SLE10SP2 and some opensuse 11.x but none of the current branches contain aufs, I guess it's and invalid candidate.
So not affected. Bouncing back.
aufs not included in current SLE kernels, close