Hide Forgot
It was found that the fix for CVE-2015-1805 incorrectly kept buffer offset and buffer length in sync on failed atomic read, potentially resulting in pipe buffer state corruption. A local, unprivileged user could use this flaw to crash the system or leak kernel memory to user-space. Upstream Linux kernel is not affected by this flaw as it was introduced by the Red Hat Enterprise Linux only fix for CVE-2015-1805. Acknowledgements: The security impact of this issue was discovered by Red Hat.
This issue has been addressed in the following products: Red Hat Enterprise Linux 7.1 EUS - Server and Compute Node Only Via RHSA-2016:0103 https://rhn.redhat.com/errata/RHSA-2016-0103.html
This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2016:0494 https://rhn.redhat.com/errata/RHSA-2016-0494.html
This issue has been addressed in the following products: Red Hat Enterprise Linux 6.6 Extended Update Support Via RHSA-2016:0617 https://rhn.redhat.com/errata/RHSA-2016-0617.html