Back to bug 1314288

Who When What Removed Added
Adam Mariš 2016-03-03 10:30:41 UTC Whiteboard impact=moderate,public=20120521,reported=20160302,source=oss-security,cvss2=5.8/AV:N/AC:M/Au:N/C:N/I:P/A:P,cwe=CWE-190,rhel-5/kernel=new,rhel-6/kernel=new,rhel-7/kernel=new,rhel-7/kernel-rt=new,mrg-2/realtime-kernel=new,rhelsa-7/arm-kernel=new,fedora-all/kernel=affected impact=moderate,public=20120521,reported=20160302,source=oss-security,cvss2=5.8/AV:N/AC:M/Au:N/C:N/I:P/A:P,cwe=CWE-190,rhel-5/kernel=new,rhel-6/kernel=new,rhel-7/kernel=new,rhel-7/kernel-rt=new,mrg-2/realtime-kernel=new,rhelsa-7/arm-kernel=new,fedora-all/kernel=notaffected
Adam Mariš 2016-03-03 10:31:57 UTC Blocks 1314289
Slawomir Czarko 2016-03-14 11:50:28 UTC CC slawomir
Vladis Dronov 2016-05-19 12:10:26 UTC CC vdronov
Whiteboard impact=moderate,public=20120521,reported=20160302,source=oss-security,cvss2=5.8/AV:N/AC:M/Au:N/C:N/I:P/A:P,cwe=CWE-190,rhel-5/kernel=new,rhel-6/kernel=new,rhel-7/kernel=new,rhel-7/kernel-rt=new,mrg-2/realtime-kernel=new,rhelsa-7/arm-kernel=new,fedora-all/kernel=notaffected impact=moderate,public=20120521,reported=20160302,source=oss-security,cvss2=5.8/AV:N/AC:M/Au:N/C:N/I:P/A:P,cwe=CWE-190,rhel-5/kernel=wontfix,rhel-6/kernel=affected,rhel-7/kernel=notaffected,rhel-7/kernel-rt=notaffected,mrg-2/realtime-kernel=notaffected,rhelsa-7/arm-kernel=notaffected,fedora-all/kernel=notaffected
Vladis Dronov 2016-05-19 12:10:52 UTC Depends On 1337535
Vladis Dronov 2016-05-19 12:23:20 UTC Whiteboard impact=moderate,public=20120521,reported=20160302,source=oss-security,cvss2=5.8/AV:N/AC:M/Au:N/C:N/I:P/A:P,cwe=CWE-190,rhel-5/kernel=wontfix,rhel-6/kernel=affected,rhel-7/kernel=notaffected,rhel-7/kernel-rt=notaffected,mrg-2/realtime-kernel=notaffected,rhelsa-7/arm-kernel=notaffected,fedora-all/kernel=notaffected impact=moderate,public=20120521,reported=20160302,source=oss-security,cvss2=3.6/AV:L/AC:L/Au:N/C:P/I:P/A:N,cwe=CWE-190,rhel-5/kernel=wontfix,rhel-6/kernel=affected,rhel-7/kernel=notaffected,rhel-7/kernel-rt=notaffected,mrg-2/realtime-kernel=notaffected,rhelsa-7/arm-kernel=notaffected,fedora-all/kernel=notaffected
Wade Mealing 2016-05-31 04:01:12 UTC CC wmealing
Doc Text It was found that AIO interface didn't use the proper rw_verify_area() helper function that checks (for example) mandatory locking on the file, and that the size of the access doesn't cause overflow of the provided offset limits.
Vladis Dronov 2016-06-01 14:03:19 UTC Doc Text It was found that AIO interface didn't use the proper rw_verify_area() helper function that checks (for example) mandatory locking on the file, and that the size of the access doesn't cause overflow of the provided offset limits. It was found that AIO interface didn't use the proper rw_verify_area() helper function with extended functionality, for example, mandatory locking on the file. Also rw_verify_area() makes extended checks, for example, that the size of the access doesn't cause overflow of the provided offset limits. This integer overflow in fs/aio.c in the Linux kernel before 3.4.1 allows local users to cause a denial of service or possibly have unspecified other impact via a large AIO iovec.
John Skeoch 2016-10-04 04:17:48 UTC CC pholasek
PnT Account Manager 2018-02-07 23:12:11 UTC CC agordeev
errata-xmlrpc 2018-06-19 04:47:01 UTC Link ID Red Hat Product Errata RHSA-2018:1854
Yasuhiro Ozone 2018-06-25 23:55:02 UTC CC yozone
PnT Account Manager 2018-07-19 06:15:16 UTC CC mguzik
PnT Account Manager 2018-08-28 22:03:21 UTC CC lwang
Eric Sammons 2019-02-08 14:57:31 UTC CC esammons
Product Security DevOps Team 2019-06-08 02:49:19 UTC Status NEW CLOSED
Resolution --- ERRATA
Last Closed 2019-06-08 02:49:19 UTC
Product Security DevOps Team 2019-09-29 13:45:06 UTC Whiteboard impact=moderate,public=20120521,reported=20160302,source=oss-security,cvss2=3.6/AV:L/AC:L/Au:N/C:P/I:P/A:N,cwe=CWE-190,rhel-5/kernel=wontfix,rhel-6/kernel=affected,rhel-7/kernel=notaffected,rhel-7/kernel-rt=notaffected,mrg-2/realtime-kernel=notaffected,rhelsa-7/arm-kernel=notaffected,fedora-all/kernel=notaffected

Back to bug 1314288