Bug 1308846 (CVE-2016-3070)

Summary: CVE-2016-3070 kernel: Null pointer dereference in trace_writeback_dirty_page()
Product: [Other] Security Response Reporter: Adam Mariš <amaris>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: aquini, bhu, dhoward, fhrbata, iboverma, jkacur, joelsmith, jross, kernel-mgr, kstutsma, lgoncalv, matt, mcressma, nmurray, plougher, pmatouse, rvrbovsk, security-response-team, slawomir, vdronov, williams
Target Milestone: ---Keywords: Reopened, Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
A security flaw was found in the Linux kernel that an attempt to move page mapped by AIO ring buffer to the other node triggers NULL pointer dereference at trace_writeback_dirty_page(), because aio_fs_backing_dev_info.dev is 0.
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-07-12 13:04:08 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1306851, 1331967, 1331968    
Bug Blocks: 1308847    

Description Adam Mariš 2016-02-16 09:30:23 UTC
It was reported that attempt to move page mapped by aio ring buffer to other node triggers NULL pointer dereference at trace_writeback_dirty_page(), because aio_fs_backing_dev_info.dev is 0.

Product bug (contains reproducer):

https://bugzilla.redhat.com/show_bug.cgi?id=1306851

Upstream patch:

http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=42cb14b110a5698ccf26ce59c4441722605a3743

Comment 1 Vladis Dronov 2016-03-23 18:46:40 UTC
Acknowledgments:

Name: Jan Stancek (Red Hat)

Comment 2 Vladis Dronov 2016-03-23 19:04:52 UTC
Statement:

This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6 as the code with the flaw is not present in the products listed.

This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 7 and MRG-2. Future updates for the respective releases may address the issue.

Comment 3 Adam Mariš 2016-03-24 08:53:55 UTC
Internal CVE assignment: CVE-2016-3070

Comment 8 errata-xmlrpc 2016-11-03 15:35:34 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2016:2574 https://rhn.redhat.com/errata/RHSA-2016-2574.html

Comment 9 errata-xmlrpc 2016-11-03 19:42:22 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2016:2584 https://rhn.redhat.com/errata/RHSA-2016-2584.html

Comment 10 errata-xmlrpc 2016-11-03 21:32:48 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2016:2574 https://rhn.redhat.com/errata/RHSA-2016-2574.html

Comment 11 errata-xmlrpc 2016-11-03 21:47:59 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2016:2584 https://rhn.redhat.com/errata/RHSA-2016-2584.html

Comment 15 Product Security DevOps Team 2019-07-12 13:04:08 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2016-3070