A vulnerability in the handling of Transactional Memory on powerpc systems was found. An unprivileged local user can crash the kernel by starting a transaction, suspending it, and then calling any of the exec() class system calls. Patch: https://patchwork.ozlabs.org/patch/636776/ Test case: https://patchwork.ozlabs.org/patch/636774/ CVE request: http://seclists.org/oss-sec/2016/q2/595
Created xen tracking bugs for this issue: Affects: fedora-all [bug 1349919]
Created qemu tracking bugs for this issue: Affects: fedora-all [bug 1349918]
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1361109]
Statement: This issue does not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG 2. This issue affects the version of the kernel packages as shipped with Red Hat Enterprise Linux 7. Future kernel updates for Red Hat Enterprise Linux 7 may address this issue.
This was fixed with commit 5b7ef8eff33ff8b3d87071a5fa463da15ec8a0c0 in 4.6.5. F23 and F24 were rebased yesterday and contain the fix. F25 and rawhide have the original upstream commit 8e96a87c5431c256feb65bcfc5aec92d9f7839b6 included already.
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2016:2574 https://rhn.redhat.com/errata/RHSA-2016-2574.html