Hide Forgot
A vulnerability was found in the Linux kernel. An unprivileged local user could triger oops in shash_async_export() by attempting to force the in-kernel hashing algorithms into decrypting an empty data set. Upstream discussion: https://lkml.org/lkml/2016/10/12/198 Upstream patch: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4afa5f9617927453ac04b24b584f6c718dfb4f45 Oss-sec post: http://www.openwall.com/lists/oss-security/2016/11/15/2
Acknowledgments: Name: Igor Redko (Virtuozzo kernel team)
*** EmbargoedBug 1390878 has been marked as a duplicate of this bug. ***
Statement: This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6 as the code creating this issue is not present in the products listed. This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 7 and Red Hat Enterprise MRG-2. Future Linux kernel updates for the respective releases might address this issue.
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1395044]
This issue has been addressed in the following products: Red Hat Enterprise MRG 2 Via RHSA-2017:1297 https://access.redhat.com/errata/RHSA-2017:1297
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2017:1298 https://access.redhat.com/errata/RHSA-2017:1298
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2017:1308 https://access.redhat.com/errata/RHSA-2017:1308