CVE-2014-0203Use After Free in Kernel

CWE-416Use After Free11 documents9 sources
Severity
5.5MEDIUMNVD
EPSS
0.1%
top 79.55%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJun 23
Latest updateMay 13

Description

The __do_follow_link function in fs/namei.c in the Linux kernel before 2.6.33 does not properly handle the last pathname component during use of certain filesystems, which allows local users to cause a denial of service (incorrect free operations and system crash) via an open system call.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages3 packages

NVDlinux/linux_kernel< 2.6.33
Debianlinux/linux_kernel< 2.6.33-1+3
NVDoracle/linux5, 6+1

Patches

🔴Vulnerability Details

3
GHSA
GHSA-48m7-cf7p-jqm7: The __do_follow_link function in fs/namei2022-05-13
CVEList
CVE-2014-0203: The __do_follow_link function in fs/namei2014-06-23
OSV
CVE-2014-0203: The __do_follow_link function in fs/namei2014-06-23

📋Vendor Advisories

4
Ubuntu
Linux kernel (EC2) vulnerabilities2014-09-02
Ubuntu
Linux kernel vulnerabilities2014-09-02
Red Hat
kernel: fs: slab corruption due to the invalid last component type during do_filp_open()2014-06-19
Debian
CVE-2014-0203: linux - The __do_follow_link function in fs/namei.c in the Linux kernel before 2.6.33 do...2014

💬Community

1
Bugzilla
CVE-2014-0203 kernel: fs: slab corruption due to the invalid last component type during do_filp_open()2014-05-05
CVE-2014-0203 — Use After Free in Linux Kernel | cvebase