Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1473209 - (CVE-2017-11473) CVE-2017-11473 kernel: Buffer overflow in mp_override_legacy_irq()
CVE-2017-11473 kernel: Buffer overflow in mp_override_legacy_irq()
Status: CLOSED WONTFIX
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
impact=low,public=20170718,reported=2...
: Security
Depends On: 1473210 1474371
Blocks: 1473211
  Show dependency treegraph
 
Reported: 2017-07-20 04:50 EDT by Adam Mariš
Modified: 2018-04-10 01:04 EDT (History)
36 users (show)

See Also:
Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Buffer overflow in the mp_override_legacy_irq() function in arch/x86/kernel/acpi/boot.c in the Linux kernel through 4.12.2 allows local users to gain privileges via a crafted ACPI table.
Story Points: ---
Clone Of:
Environment:
Last Closed: 2017-07-24 09:21:28 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2018:0654 None None None 2018-04-10 01:04 EDT

  None (edit)
Description Adam Mariš 2017-07-20 04:50:21 EDT
Buffer overflow in the mp_override_legacy_irq() function in arch/x86/kernel/acpi/boot.c in the Linux kernel through 4.12.2 allows local users to gain privileges via a crafted ACPI table.

References:

http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11473

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11473

Upstream patch:

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dad5ab0db8deac535d03e3fe3d8f2892173fa6a4
Comment 1 Adam Mariš 2017-07-20 04:51:05 EDT
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 1473210]
Comment 5 Vladis Dronov 2017-07-24 09:21:28 EDT
Statement:

Red Hat Product Security has rated this issue as having Low security impact. This issue is not currently planned to be addressed in future updates of the Red Hat products. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.
Comment 6 Justin M. Forbes 2018-01-29 11:22:20 EST
This was fixed for Fedora with the 4.12.4 kernel updates
Comment 7 errata-xmlrpc 2018-04-10 01:03:58 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2018:0654 https://access.redhat.com/errata/RHSA-2018:0654

Note You need to log in before you can comment on or make changes to this bug.