Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1395190 - (CVE-2016-10208) CVE-2016-10208 kernel: EXT4 memory corruption / SLAB out-of-bounds read
CVE-2016-10208 kernel: EXT4 memory corruption / SLAB out-of-bounds read
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20161115,repor...
: Security
Depends On: 1332503 1430968 1430969 1430970 1430971 1430972 1444529 1459302
Blocks: 1395193
  Show dependency treegraph
 
Reported: 2016-11-15 06:39 EST by Andrej Nemec
Modified: 2018-08-28 18:09 EDT (History)
36 users (show)

See Also:
Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Mounting a crafted EXT4 image read-only leads to an attacker controlled memory corruption and SLAB-Out-of-Bounds reads.
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2017:1297 normal SHIPPED_LIVE Important: kernel-rt security and bug fix update 2017-05-25 13:28:57 EDT
Red Hat Product Errata RHSA-2017:1298 normal SHIPPED_LIVE Important: kernel-rt security and bug fix update 2017-05-25 13:39:36 EDT
Red Hat Product Errata RHSA-2017:1308 normal SHIPPED_LIVE Important: kernel security, bug fix, and enhancement update 2017-05-25 15:32:54 EDT

  None (edit)
Description Andrej Nemec 2016-11-15 06:39:14 EST
Mounting a crafted EXT4 image read-only leads to a memory corruption and SLAB-Out-of-Bounds Reads (according to KASAN). Automounting a disk image either as USB or loopback is not configured by default on servers but is enabled on desktop environments.

Attackers with a remote connection will likely be unable to trigger this vulnerability on the commandline. Instead the automatic mounting feature of the GUI via a crafted USB-device is required.

The system will likely panic with a page fault, but attackers may be able to map another page in the correct location and be able to overwrite or corrupt memory possibly leading to privilege escalation. 

References:

http://seclists.org/fulldisclosure/2016/Nov/75

Product bug:

https://bugzilla.redhat.com/show_bug.cgi?id=1332503

Upstream patch:
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=3a4b77cd47bb837b8557595ec7425f281f2ca1fe

Introduced in:
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=952fc18ef9ec707ebdc16c0786ec360295e5ff15
Comment 3 Wade Mealing 2016-11-25 02:11:36 EST
Statement:

This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 7, MRG-2 and realtime kernels. This has been rated as having Moderate security impact and is currently planned to be addressed in future updates.

This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5 and 6.
Comment 4 Wade Mealing 2017-03-09 21:24:08 EST
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 1430968]
Comment 6 Justin M. Forbes 2017-03-10 08:51:20 EST
This was fixed for all fedora releases on 2017-02-14 in the 4.9.9 stable update.
Comment 8 errata-xmlrpc 2017-05-25 09:30:45 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise MRG 2

Via RHSA-2017:1297 https://access.redhat.com/errata/RHSA-2017:1297
Comment 9 errata-xmlrpc 2017-05-25 09:41:24 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2017:1298 https://access.redhat.com/errata/RHSA-2017:1298
Comment 10 errata-xmlrpc 2017-05-25 11:38:47 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2017:1308 https://access.redhat.com/errata/RHSA-2017:1308

Note You need to log in before you can comment on or make changes to this bug.