Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1410370 - (CVE-2016-9754) CVE-2016-9754 kernel: Integer overflow in ring_buffer_resize()
CVE-2016-9754 kernel: Integer overflow in ring_buffer_resize()
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
high Severity high
: ---
: ---
Assigned To: Red Hat Product Security
impact=important,public=20160513,repo...
: Security
Depends On:
Blocks: 1410372
  Show dependency treegraph
 
Reported: 2017-01-05 05:45 EST by Adam Mariš
Modified: 2018-08-28 18:11 EDT (History)
33 users (show)

See Also:
Fixed In Version: kernel 4.6.1
Doc Type: If docs needed, set a value
Doc Text:
An integer overflow vulnerability was found in the ring_buffer_resize() calculations in which a privileged user can adjust the size of the ringbuffer message size. These calculations can create an issue where the kernel memory allocator will not allocate the correct count of pages yet expect them to be usable. This can lead to the ftrace() output to appear to corrupt kernel memory and possibly be used for privileged escalation or more likely kernel panic.
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Adam Mariš 2017-01-05 05:45:45 EST
An integer overflow vulnerability in ring_buffer_resize() calculations in which a privileged user can adjust the size of the ringbuffer message size.   These calculations can create an issue where the kernel memory allocator will not allocate the correct count of pages yet expect them to be usable.  This can lead to the ftrace() output to appear to corrupt kernel memory and possibly be used for privileged escalation or more likely kernel panic.

Upstream patch:

https://git.kernel.org/cgit/linux/kernel/git/stable/linux-stable.git/commit/?id=59643d1535eb220668692a5359de22545af579f6

Reference:

https://source.android.com/security/bulletin/2017-01-01.html#eop-in-kernel-profiling-subsystem
Comment 2 Wade Mealing 2017-01-19 00:17:05 EST
Statement:

This issue does not affect the Linux kernels as shipped with Red Hat Enterprise Linux 5,6 and 7 kernels.

Note You need to log in before you can comment on or make changes to this bug.