Bug 1395190 (CVE-2016-10208)
Summary: | CVE-2016-10208 kernel: EXT4 memory corruption / SLAB out-of-bounds read | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Andrej Nemec <anemec> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | aquini, arm-mgr, bhu, dhoward, fhrbata, fweimer, gansalmon, hwkernel-mgr, iboverma, ichavero, itamar, jforbes, jkacur, joelsmith, jonathan, jross, jwboyer, kernel-maint, kernel-mgr, labbott, lgoncalv, madhu.chinakonda, matt, mchehab, mcressma, nmurray, pholasek, plougher, ppandit, rt-maint, rvrbovsk, slawomir, vdronov, williams, wmealing |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: |
Mounting a crafted EXT4 image read-only leads to an attacker controlled memory corruption and SLAB-Out-of-Bounds reads.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2019-06-08 03:02:05 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1332503, 1430968, 1430969, 1430970, 1430971, 1430972, 1444529, 1459302 | ||
Bug Blocks: | 1395193 |
Description
Andrej Nemec
2016-11-15 11:39:14 UTC
Statement: This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 7, MRG-2 and realtime kernels. This has been rated as having Moderate security impact and is currently planned to be addressed in future updates. This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5 and 6. Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1430968] This was fixed for all fedora releases on 2017-02-14 in the 4.9.9 stable update. This issue has been addressed in the following products: Red Hat Enterprise MRG 2 Via RHSA-2017:1297 https://access.redhat.com/errata/RHSA-2017:1297 This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2017:1298 https://access.redhat.com/errata/RHSA-2017:1298 This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2017:1308 https://access.redhat.com/errata/RHSA-2017:1308 |