[LU-9323] kernel update [RHEL7.3 3.10.0-514.16.1.el7] Created: 12/Apr/17  Updated: 25/May/17  Resolved: 26/Apr/17

Status: Resolved
Project: Lustre
Component/s: None
Affects Version/s: None
Fix Version/s: Lustre 2.10.0

Type: Bug Priority: Minor
Reporter: Bob Glossman (Inactive) Assignee: Bob Glossman (Inactive)
Resolution: Fixed Votes: 0
Labels: None

Issue Links:
Related
is related to LU-9174 kernel update [RHEL7.3 3.10.0-514.10.... Resolved
is related to LU-9561 kernel update [RHEL7.3 3.10.0-514.21.... Resolved
Severity: 3
Rank (Obsolete): 9223372036854775807

 Description   

Security Fix(es):

  • A race condition flaw was found in the N_HLDC Linux kernel driver when
    accessing n_hdlc.tbuf list that can lead to double free. A local, unprivileged
    user able to set the HDLC line discipline on the tty device could use this flaw
    to increase their privileges on the system. (CVE-2017-2636, Important)
  • A flaw was found in the Linux kernel key management subsystem in which a local
    attacker could crash the kernel or corrupt the stack and additional memory
    (denial of service) by supplying a specially crafted RSA key. This flaw panics
    the machine during the verification of the RSA key. (CVE-2016-8650, Moderate)
  • A flaw was found in the Linux kernel's implementation of setsockopt for the
    SO_ {SND|RCV}BUFFORCE setsockopt() system call. Users with non-namespace
    CAP_NET_ADMIN are able to trigger this call and create a situation in which the
    sockets sendbuff data size could be negative. This could adversely affect memory
    allocations and create situations where the system could crash or cause memory
    corruption. (CVE-2016-9793, Moderate)

    * A flaw was found in the Linux kernel's handling of clearing SELinux attributes
    on /proc/pid/attr files. An empty (null) write to this file can crash the system
    by causing the system to attempt to access unmapped kernel memory.
    (CVE-2017-2618, Moderate)

    Bugs fixed (https://bugzilla.redhat.com/):

    1395187 - CVE-2016-8650 kernel: Null pointer dereference via keyctl
    1402013 - CVE-2016-9793 kernel: Signed overflow for SO_{SND|RCV}

    BUFFORCE
    1419916 - CVE-2017-2618 kernel: Off-by-one error in selinux_setprocattr (/proc/self/attr/fscreate)
    1428319 - CVE-2017-2636 kernel: Race condition access to n_hdlc.tbuf causes double free in n_hdlc_release()



 Comments   
Comment by Gerrit Updater [ 13/Apr/17 ]

Bob Glossman (bob.glossman@intel.com) uploaded a new patch: https://review.whamcloud.com/26590
Subject: LU-9323 kernel: kernel update RHEL7.3 [3.10.0-514.16.1.el7]
Project: fs/lustre-release
Branch: master
Current Patch Set: 1
Commit: 08a515e63eb19f9006c7cb399d4185dab34c94e8

Comment by Gerrit Updater [ 26/Apr/17 ]

Oleg Drokin (oleg.drokin@intel.com) merged in patch https://review.whamcloud.com/26590/
Subject: LU-9323 kernel: kernel update RHEL7.3 [3.10.0-514.16.1.el7]
Project: fs/lustre-release
Branch: master
Current Patch Set:
Commit: 997b8df1b7ead3ec1df4b36fb82f14fe6464185f

Comment by Peter Jones [ 26/Apr/17 ]

Landed for 2.10

Generated at Sat Feb 10 02:25:10 UTC 2024 using Jira 9.4.14#940014-sha1:734e6822bbf0d45eff9af51f82432957f73aa32c.