Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1535199 - (CVE-2017-13216) CVE-2017-13216 kernel: escalation of privileges (EoP) in ashmem_ioctl function in drivers/staging/android/ashmen.c
CVE-2017-13216 kernel: escalation of privileges (EoP) in ashmem_ioctl functio...
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20180102,repor...
: Security
Depends On: 1535200
Blocks: 1535203
  Show dependency treegraph
 
Reported: 2018-01-16 15:04 EST by Laura Pardo
Modified: 2018-08-28 18:32 EDT (History)
35 users (show)

See Also:
Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Laura Pardo 2018-01-16 15:04:34 EST
A flaw was found in ashmem_ioctl of ashmem.c, there is an out-of-bounds write due to insufficient locking when accessing asma. This could lead to a local elevation of privilege enabling code execution as a privileged process with no additional execution privileges needed. User interaction is not needed for exploitation.

References:
https://source.android.com/security/bulletin/2018-01-01#asterisk
https://www.exploit-db.com/exploits/43464/
Comment 1 Laura Pardo 2018-01-16 15:06:23 EST
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 1535200]
Comment 2 Justin M. Forbes 2018-01-17 07:43:29 EST
The ASHMEM driver is not enabled for Fedora.
Comment 3 Wade Mealing 2018-01-24 03:08:30 EST
The ASHMEM driver is not enabled in RHEL.

Red Hat Products are not affected by this flaw.

Note You need to log in before you can comment on or make changes to this bug.