Hide Forgot
Mounting a crafted EXT4 image read-only leads to a memory corruption and SLAB-Out-of-Bounds Reads (according to KASAN). Automounting a disk image either as USB or loopback is not configured by default on servers but is enabled on desktop environments. Attackers with a remote connection will likely be unable to trigger this vulnerability on the commandline. Instead the automatic mounting feature of the GUI via a crafted USB-device is required. The system will likely panic with a page fault, but attackers may be able to map another page in the correct location and be able to overwrite or corrupt memory possibly leading to privilege escalation. References: http://seclists.org/fulldisclosure/2016/Nov/75 Product bug: Engineeringhttps://bugzilla.redhat.com/show_bug.cgi?id=1332503 Upstream patch: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=3a4b77cd47bb837b8557595ec7425f281f2ca1fe Introduced in: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=952fc18ef9ec707ebdc16c0786ec360295e5ff15
Statement: This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 7, MRG-2 and realtime kernels. This has been rated as having Moderate security impact and is currently planned to be addressed in future updates. This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5 and 6.
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1430968]
This was fixed for all fedora releases on 2017-02-14 in the 4.9.9 stable update.
This issue has been addressed in the following products: Red Hat Enterprise MRG 2 Via RHSA-2017:1297 https://access.redhat.com/errata/RHSA-2017:1297
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2017:1298 https://access.redhat.com/errata/RHSA-2017:1298
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2017:1308 https://access.redhat.com/errata/RHSA-2017:1308