A use after free vulnerability in sys_ioprio_get() was found due to get_task_ioprio() accessing the task->io_context without holding the task lock and could potentially race with exit_io_context(), leading to a use-after-free. At this time this use-after free is believed to be limited to a kernel panic via NULL pointer dreference of p->io_context->ioprio and does not lead to memory corruption or privilege escalation. The page that is used after free may be controlled by an attacker and lead to further information leaks. Upstream patch: https://git.kernel.org/cgit/linux/kernel/git/stable/linux-stable.git/commit/?id=8ba8682107ee2ca3347354e018865d8e1967c5f4 Initial public release: http://source.android.com/security/bulletin/2016-11-01.html
Statement: This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG 2 are not planning to be updated to address this issue. If this affects you please lodge a support request. Red Hat Enterprise Linux 5 is now in Production 3 phase of the support and maintenance life cycle. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1418185]