Bug 1195350 (CVE-2015-2041)

Summary: CVE-2015-2041 kernel: llc: information leak in llc2_timeout_table
Product: [Other] Security Response Reporter: Martin Prpič <mprpic>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED NOTABUG QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: agordeev, aquini, bhu, dhoward, esammons, fhrbata, gansalmon, iboverma, itamar, jforbes, jkacur, jonathan, jross, jwboyer, kernel-maint, kernel-mgr, lgoncalv, lwang, madhu.chinakonda, matt, mchehab, mcressma, mguzik, nmurray, pholasek, plougher, rt-maint, rvrbovsk, williams, wmealing
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2015-03-12 12:40:36 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 1195357    

Description Martin Prpič 2015-02-23 16:01:26 UTC
A flaw was found in the method that the linux kernel handles userspace configuration of  of the the Linux kernel's logical link control (LLC) implementation  system settings. The incorrect handling allowed a trusted user to set multiple LLC syscalls with specially formatted data.  Reading from these files also returned data from other sysctl settings that would be exposed via the same permissions to this user.

This bug provides little risk to users as the values that can be modified are exposed via proc sysctls with the same permissions.

Upstream patch:

https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6b8d9117ccb4f81b1244aafa7bc70ef8fa45fc49

Comment 1 Wade Mealing 2015-03-11 06:03:37 UTC
Statement:

This issue does not affect the versions of the kernel as shipped with Red Hat Enterprise Linux 5, 6 and 7, MRG and realtime kernels.