Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1317571 - (CVE-2016-0821) CVE-2016-0821 kernel: Too big poison pointer space
CVE-2016-0821 kernel: Too big poison pointer space
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20150910,repor...
: Security
Depends On:
Blocks: 1317580 1343802
  Show dependency treegraph
 
Reported: 2016-03-14 11:15 EDT by Adam Mariš
Modified: 2018-08-28 18:03 EDT (History)
31 users (show)

See Also:
Fixed In Version: kernel 4.3
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Adam Mariš 2016-03-14 11:15:47 EDT
The LIST_POISON feature in include/linux/poison.h in the Linux kernel before 4.3 not properly consider the relationship to the mmap_min_addr value, which makes it easier for attackers to bypass a poison-pointer protection mechanism by triggering the use of an uninitialised list entry.

This is an issue in a security mechanism, not a mechanism for leverage an attack from.  

Upstream patch:

https://github.com/torvalds/linux/commit/8a5e5e02fc83aaf67053ab53b359af08c6c49aaf

Disclosure:
http://www.openwall.com/lists/oss-security/2015/05/02/6
Comment 1 Wade Mealing 2016-04-15 05:09:22 EDT
Statement:

This issue affects versions of the kernel shipped with Red Hat Enterprise
Linux 5, 6, 7 and MRG-2 realtime kernels.

This has been rated as having Moderate security impact and is not currently
planned to be addressed in future updates. For additional information, refer
to the Red Hat Enterprise Linux Life Cycle:
https://access.redhat.com/support/policy/updates/errata/ .

Note You need to log in before you can comment on or make changes to this bug.