Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1388821 - (CVE-2016-8646) CVE-2016-8646 kernel: Oops in shash_async_export()
CVE-2016-8646 kernel: Oops in shash_async_export()
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20161115,repor...
: Security
: 1390878 (view as bug list)
Depends On: 1387632 1394099 1394100 1394101 1394102 1395044 1459304
Blocks: 1388822
  Show dependency treegraph
 
Reported: 2016-10-26 05:02 EDT by Andrej Nemec
Modified: 2018-08-28 18:08 EDT (History)
23 users (show)

See Also:
Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A vulnerability was found in the Linux kernel. An unprivileged local user could trigger oops in shash_async_export() by attempting to force the in-kernel hashing algorithms into decrypting an empty data set.
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2017:1297 normal SHIPPED_LIVE Important: kernel-rt security and bug fix update 2017-05-25 13:28:57 EDT
Red Hat Product Errata RHSA-2017:1298 normal SHIPPED_LIVE Important: kernel-rt security and bug fix update 2017-05-25 13:39:36 EDT
Red Hat Product Errata RHSA-2017:1308 normal SHIPPED_LIVE Important: kernel security, bug fix, and enhancement update 2017-05-25 15:32:54 EDT

  None (edit)
Description Andrej Nemec 2016-10-26 05:02:11 EDT
A vulnerability was found in the Linux kernel. An unprivileged local user could triger oops in shash_async_export() by attempting to force the in-kernel hashing algorithms into decrypting an empty data set.


Upstream discussion:

https://lkml.org/lkml/2016/10/12/198

Upstream patch:

https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4afa5f9617927453ac04b24b584f6c718dfb4f45

Oss-sec post: 
http://www.openwall.com/lists/oss-security/2016/11/15/2
Comment 1 Andrej Nemec 2016-10-26 05:02:25 EDT
Acknowledgments:

Name: Igor Redko (Virtuozzo kernel team)
Comment 2 Wade Mealing 2016-11-06 21:56:21 EST
*** Bug 1390878 has been marked as a duplicate of this bug. ***
Comment 3 Wade Mealing 2016-11-07 00:30:53 EST
Statement:

This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6 as the code creating this issue is not present in the products listed.

This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 7 and Red Hat Enterprise MRG-2. Future Linux kernel updates for the respective releases might address this issue.
Comment 10 Wade Mealing 2016-11-14 21:19:30 EST
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 1395044]
Comment 11 errata-xmlrpc 2017-05-25 09:30:15 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise MRG 2

Via RHSA-2017:1297 https://access.redhat.com/errata/RHSA-2017:1297
Comment 12 errata-xmlrpc 2017-05-25 09:40:57 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2017:1298 https://access.redhat.com/errata/RHSA-2017:1298
Comment 13 errata-xmlrpc 2017-05-25 11:37:56 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2017:1308 https://access.redhat.com/errata/RHSA-2017:1308

Note You need to log in before you can comment on or make changes to this bug.