Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1399722 - (CVE-2016-7911) CVE-2016-7911 kernel: Use after free in sys_ioprio_get()
CVE-2016-7911 kernel: Use after free in sys_ioprio_get()
Status: CLOSED WONTFIX
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20160701,repor...
: Security
Depends On: 1418185
Blocks: 1395238
  Show dependency treegraph
 
Reported: 2016-11-29 10:40 EST by Adam Mariš
Modified: 2017-04-19 05:01 EDT (History)
37 users (show)

See Also:
Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A use-after-free vulnerability in sys_ioprio_get() was found due to get_task_ioprio() accessing the task->io_context without holding the task lock and could potentially race with exit_io_context(), leading to a use-after-free.
Story Points: ---
Clone Of:
Environment:
Last Closed: 2017-02-09 08:23:23 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Adam Mariš 2016-11-29 10:40:46 EST
A use after free vulnerability in sys_ioprio_get() was found due to get_task_ioprio() accessing the task->io_context without holding the task lock and could potentially race with exit_io_context(), leading to a use-after-free.

At this time this use-after free is believed to be limited to a kernel panic via NULL pointer dreference of p->io_context->ioprio and does not lead to memory corruption or privilege escalation.  The page that is used after free may be controlled by an attacker and lead to further information leaks.


Upstream patch:
https://git.kernel.org/cgit/linux/kernel/git/stable/linux-stable.git/commit/?id=8ba8682107ee2ca3347354e018865d8e1967c5f4

Initial public release:
http://source.android.com/security/bulletin/2016-11-01.html
Comment 1 Wade Mealing 2016-12-02 02:31:22 EST
Statement:

This issue affects the versions of the Linux kernel as shipped with
Red Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG 2. Future kernel
updates for Red Hat Enterprise Linux  6, 7 and Red Hat Enterprise MRG 2 are not planning to be updated to address this issue.   If this affects you please lodge a support request.

Red Hat Enterprise Linux 5 is now in Production 3 phase of the support and maintenance life cycle. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.
Comment 4 Wade Mealing 2017-02-01 03:23:03 EST
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 1418185]

Note You need to log in before you can comment on or make changes to this bug.