Bug 1422825 (CVE-2017-6001) - CVE-2017-6001 kernel: Race condition between multiple sys_perf_event_open() calls
Summary: CVE-2017-6001 kernel: Race condition between multiple sys_perf_event_open() c...
Status: NEW
Alias: CVE-2017-6001
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard: impact=moderate,public=20170114,repor...
Keywords: Security
Depends On: 1422827 1434751 1434752 1434753 1434754
Blocks: 1422826
TreeView+ depends on / blocked
 
Reported: 2017-02-16 10:59 UTC by Andrej Nemec
Modified: 2019-02-28 22:31 UTC (History)
32 users (show)

(edit)
It was found that the original fix for CVE-2016-6786 was incomplete. There exist a race between two concurrent sys_perf_event_open() calls when both try and move the same pre-existing software group into a hardware context.
Clone Of:
(edit)
Last Closed:


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2017:1842 normal SHIPPED_LIVE Important: kernel security, bug fix, and enhancement update 2017-08-01 18:22:09 UTC
Red Hat Product Errata RHSA-2017:2077 normal SHIPPED_LIVE Important: kernel-rt security, bug fix, and enhancement update 2017-08-01 18:13:37 UTC
Red Hat Product Errata RHSA-2017:2669 normal SHIPPED_LIVE Important: kernel-rt security and bug fix update 2017-09-07 00:36:52 UTC
Red Hat Product Errata RHSA-2018:1854 None None None 2018-06-19 04:47 UTC

Description Andrej Nemec 2017-02-16 10:59:29 UTC
It was found that the original fix for CVE-2016-6786 was incomplete. There exist a race between two concurrent sys_perf_event_open() calls when both try and move the same pre-existing software group into a hardware context.

References:

https://marc.info/?l=linux-kernel&m=148370849716035
http://seclists.org/oss-sec/2017/q1/446

Upstream patch:

https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=321027c1fe77f892f4ea07846aeae08cefbbb290

Comment 1 Andrej Nemec 2017-02-16 11:03:17 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 1422827]

Comment 2 Justin M. Forbes 2017-02-16 12:57:40 UTC
This was fixed in the 4.9.7 stable update available to all Fedora releases.

Comment 4 Vladis Dronov 2017-03-22 09:49:35 UTC
Statement:

This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5 as the perf subsystem where the flaw was found is not present in this product.

This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 6, 7 and MRG-2. Future Linux kernel updates for the respective releases might address this issue.

Comment 10 errata-xmlrpc 2017-08-01 19:13:12 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2017:2077 https://access.redhat.com/errata/RHSA-2017:2077

Comment 11 errata-xmlrpc 2017-08-02 07:53:17 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2017:1842 https://access.redhat.com/errata/RHSA-2017:1842

Comment 12 errata-xmlrpc 2017-09-06 20:40:08 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise MRG 2

Via RHSA-2017:2669 https://access.redhat.com/errata/RHSA-2017:2669

Comment 13 errata-xmlrpc 2018-06-19 04:47:09 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6

Via RHSA-2018:1854 https://access.redhat.com/errata/RHSA-2018:1854


Note You need to log in before you can comment on or make changes to this bug.