Bug 1399727 (CVE-2016-7910)

Summary: CVE-2016-7910 kernel: Use after free in seq file
Product: [Other] Security Response Reporter: Adam Mariš <amaris>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: aquini, arm-mgr, bhu, dhoward, dominik.mierzejewski, fhrbata, gansalmon, iboverma, ichavero, itamar, jforbes, jkacur, joelsmith, jonathan, jross, jwboyer, kernel-maint, kernel-mgr, labbott, lgoncalv, madhu.chinakonda, matt, mchehab, mcressma, nmurray, pholasek, plougher, ppandit, rt-maint, rvrbovsk, vdronov, williams, wmealing, yozone
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
A flaw was found in the Linux kernel's implementation of seq_file where a local attacker could manipulate memory in the put() function pointer. This could lead to memory corruption and possible privileged escalation.
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-06-08 03:02:47 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1418548, 1418549, 1418550, 1418551, 1418552, 1418553, 1418554, 1418555, 1459303    
Bug Blocks: 1395238    

Description Adam Mariš 2016-11-29 15:43:27 UTC
A flaw was found in the Linux kernels implementation of seq_file where an local attacker could create a situation in which an attacker could manipulate memory in which the function pointer to put() could be used for malicious purposes. This could lead to memory corruption and possible privledged escalation.

There are no exploits available for this flaw at this time.

Upstream patch:

https://git.kernel.org/cgit/linux/kernel/git/stable/linux-stable.git/commit/?id=77da160530dd1dc94f6ae15a981f24e5f0021e84

Comment 7 Vladis Dronov 2017-02-09 13:26:40 UTC
Statement:

This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5 as the code which can trigger the flaw is not present in the products listed.

This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 6, 7 and MRG-2. Future Linux kernel updates for the respective releases might address this issue.

Comment 8 errata-xmlrpc 2017-04-11 11:48:50 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6

Via RHSA-2017:0892 https://access.redhat.com/errata/RHSA-2017:0892

Comment 9 errata-xmlrpc 2017-05-25 13:31:06 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise MRG 2

Via RHSA-2017:1297 https://access.redhat.com/errata/RHSA-2017:1297

Comment 10 errata-xmlrpc 2017-05-25 13:41:45 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2017:1298 https://access.redhat.com/errata/RHSA-2017:1298

Comment 11 errata-xmlrpc 2017-05-25 15:39:10 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2017:1308 https://access.redhat.com/errata/RHSA-2017:1308