A information leak was found in /dev/snd/timer driver which was prone to a data race, leading to uninitialized memory from the kernel heap being copied to user space. A local user with access to /dev/snd/timer could use this flaw to read kernel space memory of other users. References: http://seclists.org/oss-sec/2017/q2/455 https://bugzilla.suse.com/show_bug.cgi?id=1044125 CVE-ID assignment: http://seclists.org/oss-sec/2017/q2/463 Upstream patches: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d11662f4f798b50d8c8743f433842c3e40fe3378 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ba3021b2c79b2fa9114f92790a99deb27a65b728
Acknowledgments: Name: Alexander Potapenko (Google)
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1463314]
This was fixed for Fedora with the 4.11.5 stable update
External BTS bug for CVE-2017-1000380: https://bugzilla.suse.com/show_bug.cgi?id=1044125
Statement: This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5 and 6. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates of this product due to its life cycle. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/. This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 7 and Red Hat Enterprise MRG 2 may address this issue.
This issue has been addressed in the following products: Red Hat Enterprise MRG 2 Via RHSA-2017:3295 https://access.redhat.com/errata/RHSA-2017:3295
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2017:3315 https://access.redhat.com/errata/RHSA-2017:3315
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2017:3322 https://access.redhat.com/errata/RHSA-2017:3322