Bug 1303961 (CVE-2016-0774)

Summary: CVE-2016-0774 kernel: pipe buffer state corruption after unsuccessful atomic read from pipe
Product: [Other] Security Response Reporter: Petr Matousek <pmatouse>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: agordeev, aquini, arm-mgr, bhu, carnil, dhoward, esammons, fhrbata, gansalmon, iboverma, itamar, jforbes, jkacur, joelsmith, jonathan, jross, jwboyer, kernel-maint, kernel-mgr, kstutsma, lgoncalv, lwang, madhu.chinakonda, matt, mchehab, mcressma, mguzik, nmurray, pholasek, plougher, rt-maint, rvrbovsk, vdronov, williams
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
It was found that the fix for CVE-2015-1805 incorrectly kept buffer offset and buffer length in sync on a failed atomic read, potentially resulting in a pipe buffer state corruption. A local, unprivileged user could use this flaw to crash the system or leak kernel memory to user space.
Story Points: ---
Clone Of: Environment:
Last Closed: 2016-03-23 17:38:39 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Bug Depends On: 1239006, 1290419, 1302223, 1310148, 1310149    
Bug Blocks: 1302237    

Description Petr Matousek 2016-02-02 14:34:35 UTC
It was found that the fix for CVE-2015-1805 incorrectly kept buffer offset and
buffer length in sync on failed atomic read, potentially resulting in pipe
buffer state corruption.

A local, unprivileged user could use this flaw to crash the system or leak
kernel memory to user-space.

Upstream Linux kernel is not affected by this flaw as it was introduced by
the Red Hat Enterprise Linux only fix for CVE-2015-1805.

Acknowledgements:

The security impact of this issue was discovered by Red Hat.

Comment 1 errata-xmlrpc 2016-02-02 17:04:35 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7.1 EUS - Server and Compute Node Only

Via RHSA-2016:0103 https://rhn.redhat.com/errata/RHSA-2016-0103.html

Comment 3 errata-xmlrpc 2016-03-22 21:51:37 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6

Via RHSA-2016:0494 https://rhn.redhat.com/errata/RHSA-2016-0494.html

Comment 5 errata-xmlrpc 2016-04-12 09:25:47 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6.6 Extended Update Support

Via RHSA-2016:0617 https://rhn.redhat.com/errata/RHSA-2016-0617.html