Hide Forgot
A flaw was found in the Linux kernels implementation of seq_file where an local attacker could create a situation in which an attacker could manipulate memory in which the function pointer to put() could be used for malicious purposes. This could lead to memory corruption and possible privledged escalation. There are no exploits available for this flaw at this time. Upstream patch: https://git.kernel.org/cgit/linux/kernel/git/stable/linux-stable.git/commit/?id=77da160530dd1dc94f6ae15a981f24e5f0021e84
Statement: This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5 as the code which can trigger the flaw is not present in the products listed. This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 6, 7 and MRG-2. Future Linux kernel updates for the respective releases might address this issue.
This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2017:0892 https://access.redhat.com/errata/RHSA-2017:0892
This issue has been addressed in the following products: Red Hat Enterprise MRG 2 Via RHSA-2017:1297 https://access.redhat.com/errata/RHSA-2017:1297
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2017:1298 https://access.redhat.com/errata/RHSA-2017:1298
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2017:1308 https://access.redhat.com/errata/RHSA-2017:1308