Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1479307 - (CVE-2017-1000112) CVE-2017-1000112 kernel: Exploitable memory corruption due to UFO to non-UFO path switch
CVE-2017-1000112 kernel: Exploitable memory corruption due to UFO to non-UFO ...
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
high Severity high
: ---
: ---
Assigned To: Red Hat Product Security
impact=important,public=20170810,repo...
: Security
Depends On: 1481536 1640510 1480465 1481529 1481530 1481531 1481532 1481533 1481534 1481535 1481537
Blocks: 1479311
  Show dependency treegraph
 
Reported: 2017-08-08 06:49 EDT by Andrej Nemec
Modified: 2018-10-18 05:13 EDT (History)
40 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
An exploitable memory corruption flaw was found in the Linux kernel. The append path can be erroneously switched from UFO to non-UFO in ip_ufo_append_data() when building an UFO packet with MSG_MORE option. If unprivileged user namespaces are available, this flaw can be exploited to gain root privileges.
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2017:2918 normal SHIPPED_LIVE Important: kernel-rt security and bug fix update 2017-10-19 13:24:24 EDT
Red Hat Product Errata RHSA-2017:2930 normal SHIPPED_LIVE Important: kernel security and bug fix update 2017-10-19 14:47:35 EDT
Red Hat Product Errata RHSA-2017:2931 normal SHIPPED_LIVE Important: kernel-rt security and bug fix update 2017-10-19 14:48:35 EDT
Red Hat Product Errata RHSA-2017:3200 normal SHIPPED_LIVE Important: kernel security and bug fix update 2017-11-14 20:34:41 EST

  None (edit)
Description Andrej Nemec 2017-08-08 06:49:42 EDT
A memory corruption issue was found in the Linux kernel. 

When building a UFO packet with MSG_MORE __ip_append_data() calls
ip_ufo_append_data() to append. However in between two send() calls,
the append path can be switched from UFO to non-UFO one, which leads
to a memory corruption.

In case UFO packet lengths exceeds MTU, copy = maxfraglen - skb->len
becomes negative on the non-UFO path and the branch to allocate new
skb is taken. This triggers fragmentation and computation of fraggap =
skb_prev->len - maxfraglen. Fraggap can exceed MTU, causing copy =
datalen - transhdrlen - fraggap to become negative. Subsequently
skb_copy_and_csum_bits() writes out-of-bounds.

Introducing commit:

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e89e9cf539a2
Comment 1 Andrej Nemec 2017-08-08 06:49:54 EDT
Acknowledgments:

Name: Andrey Konovalov
Comment 2 Adam Mariš 2017-08-11 04:08:16 EDT
Public via:

http://seclists.org/oss-sec/2017/q3/277
Comment 3 Adam Mariš 2017-08-11 04:08:59 EDT
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 1480465]
Comment 5 Wade Mealing 2017-08-14 23:57:19 EDT
Statement:

This issue affects the Linux kernel packages as shipped with Red Hat
Enterprise Linux 5,6, 7 and MRG-2.

Future Linux kernel updates for the respective releases may address this issue.
Comment 7 Wade Mealing 2017-08-15 01:20:50 EDT
Additional information:

This mainly affects systems that have UFO (UDP fragment offload) enabled.

You can see if this is configured on or off with the ethool command:

# ethtool -k em1 |grep "udp-fragmentation-offload:"

udp-fragmentation-offload: off [fixed]


If enabled, disabling the UDP fragementation offload will mitigate this flaw and is documented in this solution: https://access.redhat.com/solutions/2127401
Comment 10 errata-xmlrpc 2017-10-19 09:27:17 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise MRG 2

Via RHSA-2017:2918 https://access.redhat.com/errata/RHSA-2017:2918
Comment 11 errata-xmlrpc 2017-10-19 11:06:56 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2017:2930 https://access.redhat.com/errata/RHSA-2017:2930
Comment 12 errata-xmlrpc 2017-10-19 11:10:32 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2017:2931 https://access.redhat.com/errata/RHSA-2017:2931
Comment 16 errata-xmlrpc 2017-11-14 15:39:08 EST
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6

Via RHSA-2017:3200 https://access.redhat.com/errata/RHSA-2017:3200

Note You need to log in before you can comment on or make changes to this bug.