Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 688898 - (CVE-2011-1169) CVE-2011-1169 kernel: check adapter index in hpi_ioctl
CVE-2011-1169 kernel: check adapter index in hpi_ioctl
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
high Severity high
: ---
: ---
Assigned To: Red Hat Product Security
public=20110317,reported=20110317,sou...
: Security
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2011-03-18 08:45 EDT by Petr Matousek
Modified: 2018-08-28 17:52 EDT (History)
5 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Petr Matousek 2011-03-18 08:45:29 EDT
Description of the problem:
The user-supplied index into the adapters array needs to be checked, or
an out-of-bounds kernel pointer could be accessed and used, leading to
potentially exploitable memory corruption.

Reference:
http://seclists.org/oss-sec/2011/q1/540

Upstream commit:
http://git.kernel.org/?p=linux/kernel/git/tiwai/sound-2.6.git;a=commit;h=4a122c10fbfe9020df469f0f669da129c5757671

Acknowledgements:                                                                                                                                                                            
                                                                                                                                                                                                     
Red Hat would like to thank Dan Rosenberg for reporting this issue.
Comment 1 Petr Matousek 2011-03-18 08:48:07 EDT
Statement:

The Linux kernel as shipped with Red Hat Enterprise Linux 4, 5, 6 and
Red Hat Enterprise MRG are not affected as they did not backport upstream
commit 719f82d3 that introduced this issue.

Note You need to log in before you can comment on or make changes to this bug.