Bug 1303961 - (CVE-2016-0774) CVE-2016-0774 kernel: pipe buffer state corruption after unsuccessful atomic read from pipe
CVE-2016-0774 kernel: pipe buffer state corruption after unsuccessful atomic ...
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20160202,repor...
: Security
Depends On: 1239006 1290419 1302223 1310148 1310149
Blocks: 1302237
  Show dependency treegraph
 
Reported: 2016-02-02 09:34 EST by Petr Matousek
Modified: 2016-04-12 05:25 EDT (History)
34 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
It was found that the fix for CVE-2015-1805 incorrectly kept buffer offset and buffer length in sync on a failed atomic read, potentially resulting in a pipe buffer state corruption. A local, unprivileged user could use this flaw to crash the system or leak kernel memory to user space.
Story Points: ---
Clone Of:
Environment:
Last Closed: 2016-03-23 13:38:39 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Petr Matousek 2016-02-02 09:34:35 EST
It was found that the fix for CVE-2015-1805 incorrectly kept buffer offset and
buffer length in sync on failed atomic read, potentially resulting in pipe
buffer state corruption.

A local, unprivileged user could use this flaw to crash the system or leak
kernel memory to user-space.

Upstream Linux kernel is not affected by this flaw as it was introduced by
the Red Hat Enterprise Linux only fix for CVE-2015-1805.

Acknowledgements:

The security impact of this issue was discovered by Red Hat.
Comment 1 errata-xmlrpc 2016-02-02 12:04:35 EST
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7.1 EUS - Server and Compute Node Only

Via RHSA-2016:0103 https://rhn.redhat.com/errata/RHSA-2016-0103.html
Comment 3 errata-xmlrpc 2016-03-22 17:51:37 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6

Via RHSA-2016:0494 https://rhn.redhat.com/errata/RHSA-2016-0494.html
Comment 5 errata-xmlrpc 2016-04-12 05:25:47 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6.6 Extended Update Support

Via RHSA-2016:0617 https://rhn.redhat.com/errata/RHSA-2016-0617.html

Note You need to log in before you can comment on or make changes to this bug.