Bug 678169 (CVE-2011-0716)

Summary: CVE-2011-0716 kernel: deficiency in processing igmp host membership reports in br_multicast
Product: [Other] Security Response Reporter: Petr Matousek <pmatouse>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: arozansk, dhoward, kernel-mgr, kmcmartin, lwang, tcallawa, vkrizan
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2015-07-29 13:52:55 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 659421, 678172    
Bug Blocks:    

Description Petr Matousek 2011-02-16 23:48:07 UTC
Description of problem:
It was found that executing bridge snooping code triggered by host originated IGMP packets could cause corruption in 512-byte slabs, most commonly leading to crashes in jbd2. This could be possibly exploited by local unprivileged user to crash the host (DoS).

Comment 2 Petr Matousek 2011-02-16 23:51:30 UTC
Statement:

This issue did not affect the versions of the Linux kernel as shipped with Red
Hat Enterprise Linux 4, 5, and Red Hat Enterprise MRG as they did not include
support for the bridge snooping functionality. A future update in Red Hat
Enterprise Linux 6 may address this flaw.

Comment 5 errata-xmlrpc 2011-04-08 02:57:47 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 6

Via RHSA-2011:0421 https://rhn.redhat.com/errata/RHSA-2011-0421.html