Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1533909 - (CVE-2018-5344) CVE-2018-5344 kernel: drivers/block/loop.c mishandles lo_release serialization allowing denial-of-service
CVE-2018-5344 kernel: drivers/block/loop.c mishandles lo_release serializatio...
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20180106,repor...
: Security
Depends On: 1533910 1541228 1541230 1541231 1541232 1533911 1541229
Blocks: 1533912
  Show dependency treegraph
 
Reported: 2018-01-12 09:03 EST by Adam Mariš
Modified: 2018-08-28 18:32 EDT (History)
45 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
A flaw was found in the Linux kernel's handling of loopback devices. An attacker, who has permissions to setup loopback disks, may create a denial of service or other unspecified actions.
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Adam Mariš 2018-01-12 09:03:33 EST
A flaw was found in the Linux kernels handling of loopback devices where it mishandles the release (lo_release function) where an attacker who has permissions to setup loopback disks.

This may allow an attacker to cause a denial of service (__lock_acquire use-after-free) or possibly have unspecified other impact.

Upstream patch:

https://github.com/torvalds/linux/commit/ae6650163c66a7eff1acd6eb8b0f752dcfa8eba5
Comment 1 Adam Mariš 2018-01-12 09:05:42 EST
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 1533911]
Comment 8 Eric Christensen 2018-02-02 11:17:30 EST
Statement:

This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5 and 6.

This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 7 and MRG-2.

Future Linux kernel updates for the respective releases may address this issue.

Note You need to log in before you can comment on or make changes to this bug.