Bug 1276588 (CVE-2015-8019)
Summary: | CVE-2015-8019 kernel: net: buffer overflow when copying data from skbuff to userspace | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Martin Prpič <mprpic> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED NOTABUG | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | agordeev, aquini, arm-mgr, bhu, carnil, dhoward, esammons, fhrbata, gansalmon, iboverma, itamar, jforbes, jkacur, joelsmith, jonathan, jross, jwboyer, kernel-maint, kernel-mgr, kstutsma, lgoncalv, lwang, madhu.chinakonda, matt, mchehab, mcressma, mguzik, nmurray, pholasek, plougher, rt-maint, rvrbovsk, slawomir, vdronov, williams |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2015-11-30 14:55:35 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1276589 | ||
Bug Blocks: | 1276590 |
Description
Martin Prpič
2015-10-30 08:55:52 UTC
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1276589] I don't think this is applicable to Fedora. The original report was here: http://www.openwall.com/lists/oss-security/2015/10/27/11 and that pointed out that impacted versions are only before 3.19 with a particular commit applied (89c22d8c3b27 ("net: Fix skb csum races when peeking")) but are lacking the ioviter conversion. The patch referenced in the initial comment also clearly spells this out. All Fedora releases are on 4.1.y or newer, and should not be affected by this. Statement: This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6, 7 and MRG-2, as the code introduced the flaw is not present in these products. |