Описание
[apparmor: fix side-effect bug in match_char() macro usage]
Пакеты
| Пакет | Статус | Версия исправления | Релиз | Тип |
|---|---|---|---|---|
| linux | fixed | 6.19.6-2 | package | |
| linux | fixed | 6.12.74-2 | trixie | package |
| linux | fixed | 6.1.164-1 | bookworm | package |
| linux | fixed | 5.10.251-1 | bullseye | package |
Примечания
https://git.kernel.org/linus/8756b68edae37ff546c02091989a4ceab3f20abd (7.0-rc4)
https://www.qualys.com/2026/03/10/crack-armor.txt
EPSS
Связанные уязвимости
In the Linux kernel, the following vulnerability has been resolved: apparmor: fix side-effect bug in match_char() macro usage The match_char() macro evaluates its character parameter multiple times when traversing differential encoding chains. When invoked with *str++, the string pointer advances on each iteration of the inner do-while loop, causing the DFA to check different characters at each iteration and therefore skip input characters. This results in out-of-bounds reads when the pointer advances past the input buffer boundary. [ 94.984676] ================================================================== [ 94.985301] BUG: KASAN: slab-out-of-bounds in aa_dfa_match+0x5ae/0x760 [ 94.985655] Read of size 1 at addr ffff888100342000 by task file/976 [ 94.986319] CPU: 7 UID: 1000 PID: 976 Comm: file Not tainted 6.19.0-rc7-next-20260127 #1 PREEMPT(lazy) [ 94.986322] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 94.986329]...
EPSS