A flaw was found in the Linux kernel with files on tmpfs and hugetlbfs. An attacker is able to bypass file permissions on filesystems mounted with tmpfs/hugetlbs to modify a file and possibly disrupt normal system behaviour. At this time there is an understanding there is no crash or priviledge escalation but the impact of modifications on these filesystems of files in production systems may have adverse affects. A suggested upstream patch: https://lore.kernel.org/lkml/20181126173452.26955-1-aarcange@redhat.com/T/#u An upstream patchset: 9e368259ad988356c4c95150fafd1a06af095d98 userfaultfd: use ENOENT instead of EFAULT if the atomic copy user fails 5b51072e97d587186c2f5390c8c9c1fb7e179505 userfaultfd: shmem: allocate anonymous memory for MAP_PRIVATE shmem 29ec90660d68bbdd69507c1c8b4e33aa299278b1 userfaultfd: shmem/hugetlbfs: only allow to register VM_MAYWRITE vmas e2a50c1f64145a04959df2442305d57307e5395a userfaultfd: shmem: add i_size checks dcf7fe9d89763a28e0f43975b422ff141fe79e43 userfaultfd: shmem: UFFDIO_COPY: set the page dirty if VM_WRITE is not set
*** Bug 1640515 has been marked as a duplicate of this bug. ***
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1658740]
This issue has been addressed in the following products: Red Hat Enterprise Linux 7.5 Extended Update Support Via RHSA-2019:0202 https://access.redhat.com/errata/RHSA-2019:0202
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2019:0163 https://access.redhat.com/errata/RHSA-2019:0163
This issue has been addressed in the following products: Red Hat Enterprise Linux 7.4 Extended Update Support Via RHSA-2019:0324 https://access.redhat.com/errata/RHSA-2019:0324
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2019:0831 https://access.redhat.com/errata/RHSA-2019:0831