Bug 1404939 (CVE-2016-7914) - CVE-2016-7914 kernel: assoc_array: don't call compare_object() on a node
Summary: CVE-2016-7914 kernel: assoc_array: don't call compare_object() on a node
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2016-7914
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1340073 1404942
Blocks: 1395269
TreeView+ depends on / blocked
 
Reported: 2016-12-15 07:14 UTC by Vladis Dronov
Modified: 2021-02-17 02:52 UTC (History)
34 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
The assoc_array_insert_into_terminal_node() function in 'lib/assoc_array.c' in the Linux kernel before 4.5.3 does not check whether a slot is a leaf, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (invalid pointer dereference and out-of-bounds read) via an application that uses associative-array data structures.
Clone Of:
Environment:
Last Closed: 2016-12-15 20:57:21 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHEA-2017:3163 0 normal SHIPPED_LIVE new packages: kernel-alt 2017-11-09 14:59:25 UTC

Description Vladis Dronov 2016-12-15 07:14:31 UTC
The assoc_array_insert_into_terminal_node() function in 'lib/assoc_array.c' in the Linux kernel before 4.5.3 does not check whether a slot is a leaf, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (invalid pointer dereference and out-of-bounds read) via an application that uses associative-array data structures, as demonstrated by the keyutils test suite.

References:

http://source.android.com/security/bulletin/2016-11-01.html

https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-7914

Upstream patch:

https://git.kernel.org/cgit/linux/kernel/git/stable/linux-stable.git/commit/?id=8d4a2ec1e0b41b0cf9a0c5cd4511da7f8e4f3de2

Comment 4 Vladis Dronov 2016-12-15 07:39:20 UTC
Statement:

This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5 and 6 as the code with the flaw is not present in the products listed.

This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 7 and Red Hat Enterprise MRG-2 as the flaw was already fixed in the products listed.


Note You need to log in before you can comment on or make changes to this bug.