Bug 1661503 (CVE-2018-16885) - CVE-2018-16885 kernel: out-of-bound read in memcpy_fromiovecend()
Summary: CVE-2018-16885 kernel: out-of-bound read in memcpy_fromiovecend()
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2018-16885
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1622337 1666275 1666276
Blocks: 1635030
TreeView+ depends on / blocked
 
Reported: 2018-12-21 11:52 UTC by Vladis Dronov
Modified: 2021-02-16 22:37 UTC (History)
13 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in the Linux kernel that allows the userspace to call memcpy_fromiovecend() and similar functions with a zero offset and buffer length. This can cause a read beyond the buffer boundaries flaw and, in certain cases, cause a memory access fault and a system halt by accessing invalid memory address.
Clone Of:
Environment:
Last Closed: 2019-08-06 13:21:11 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2019:2029 0 None None None 2019-08-06 12:04:29 UTC
Red Hat Product Errata RHSA-2019:2043 0 None None None 2019-08-06 12:06:53 UTC

Description Vladis Dronov 2018-12-21 11:52:48 UTC
A flaw was found in the Linux kernel that allows the userspace to call memcpy_fromiovecend() and similar functions with a zero offset and buffer length which causes the read beyond the buffer boundaries, in certain cases causing a memory access fault and a system halt by accessing invalid memory address.

Note: this is a RHEL-only bug.

Comment 1 Vladis Dronov 2018-12-21 11:52:51 UTC
Acknowledgments:

Name: Paolo Abeni (Red Hat)

Comment 3 Nicholas Luedtke 2018-12-22 00:23:24 UTC
Any more information on this? Fixing commit and/or introducing commit?

Comment 4 Vladis Dronov 2018-12-22 09:34:01 UTC
(In reply to Nicholas Luedtke from comment #3)
> Any more information on this? Fixing commit and/or introducing commit?

Hello, Nicholas,
I apologize for not mentioning previously that this is a RHEL-only bug.

This specific bug is indirectly fixed upstream by UFO removal, and
the buggy memcpy_fromiovecend() (and related functions) are fixed by:

commit 21226abb4e9f14d88238964d89b279e461ddc30c
Author: Al Viro <viro.org.uk>
Date: Fri Nov 28 15:48:29 2014 -0500
net: switch memcpy_fromiovec()/memcpy_fromiovecend() users to copy_from_iter()

Comment 8 Pavel Tikhomirov 2019-01-16 10:50:48 UTC
(In reply to Pavel Tikhomirov from comment #7)
> JFYI https://bugzilla.redhat.com/show_bug.cgi?id=1661503
> https://lists.openvz.org/pipermail/devel/2018-December/072970.html

Sorry for inconvenience, I meant https://bugzilla.redhat.com/show_bug.cgi?id=1659451, but accidentally missed, we have similar issue where. And https://lists.openvz.org/pipermail/devel/2018-December/072970.html is a possible fix for it.

Comment 9 errata-xmlrpc 2019-08-06 12:04:28 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2019:2029 https://access.redhat.com/errata/RHSA-2019:2029

Comment 10 errata-xmlrpc 2019-08-06 12:06:51 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2019:2043 https://access.redhat.com/errata/RHSA-2019:2043

Comment 11 Product Security DevOps Team 2019-08-06 13:21:11 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2018-16885


Note You need to log in before you can comment on or make changes to this bug.