[LU-9561] kernel update [RHEL7.3 3.10.0-514.21.1.el7] Created: 25/May/17  Updated: 19/Jun/17  Resolved: 07/Jun/17

Status: Resolved
Project: Lustre
Component/s: None
Affects Version/s: None
Fix Version/s: Lustre 2.10.0

Type: Bug Priority: Minor
Reporter: Bob Glossman (Inactive) Assignee: Bob Glossman (Inactive)
Resolution: Fixed Votes: 0
Labels: None

Issue Links:
Related
is related to LU-9323 kernel update [RHEL7.3 3.10.0-514.16.... Resolved
is related to LU-9686 kernel update [RHEL7.3 3.10.0-514.21.... Resolved
Severity: 3
Rank (Obsolete): 9223372036854775807

 Description   

Security Fix(es):

  • It was found that the packet_set_ring() function of the Linux kernel's
    networking implementation did not properly validate certain block-size data. A
    local attacker with CAP_NET_RAW capability could use this flaw to trigger a
    buffer overflow, resulting in the crash of the system. Due to the nature of the
    flaw, privilege escalation cannot be fully ruled out. (CVE-2017-7308, Important)
  • Mounting a crafted EXT4 image read-only leads to an attacker controlled memory
    corruption and SLAB-Out-of-Bounds reads. (CVE-2016-10208, Moderate)
  • A flaw was found in the Linux kernel's implementation of seq_file where a
    local attacker could manipulate memory in the put() function pointer. This could
    lead to memory corruption and possible privileged escalation. (CVE-2016-7910,
    Moderate)
  • A vulnerability was found in the Linux kernel. An unprivileged local user
    could trigger oops in shash_async_export() by attempting to force the in-kernel
    hashing algorithms into decrypting an empty data set. (CVE-2016-8646, Moderate)
  • It was reported that with Linux kernel, earlier than version v4.10-rc8, an
    application may trigger a BUG_ON in sctp_wait_for_sndbuf if the socket tx buffer
    is full, a thread is waiting on it to queue more data, and meanwhile another
    thread peels off the association being used by the first thread. (CVE-2017-5986,
    Moderate)

Additional Changes:

https://access.redhat.com/articles/3034221

Bugs fixed (https://bugzilla.redhat.com/):

1388821 - CVE-2016-8646 kernel: Oops in shash_async_export()
1395190 - CVE-2016-10208 kernel: EXT4 memory corruption / SLAB out-of-bounds read
1399727 - CVE-2016-7910 kernel: Use after free in seq file
1420276 - CVE-2017-5986 kernel: Reachable BUG_ON from userspace in sctp_wait_for_sndbuf
1437404 - CVE-2017-7308 kernel: net/packet: overflow in check for priv area size



 Comments   
Comment by Gerrit Updater [ 26/May/17 ]

Bob Glossman (bob.glossman@intel.com) uploaded a new patch: https://review.whamcloud.com/27303
Subject: LU-9561 kernel: kernel update RHEL7.3 [3.10.0-514.21.1.el7]
Project: fs/lustre-release
Branch: master
Current Patch Set: 1
Commit: c9dc4deb4678ca3389353c2c878b068a830c5af6

Comment by Gerrit Updater [ 07/Jun/17 ]

Oleg Drokin (oleg.drokin@intel.com) merged in patch https://review.whamcloud.com/27303/
Subject: LU-9561 kernel: kernel update RHEL7.3 [3.10.0-514.21.1.el7]
Project: fs/lustre-release
Branch: master
Current Patch Set:
Commit: a933ef10b723207ac9b90862775e39b9e24138d5

Comment by Peter Jones [ 07/Jun/17 ]

Landed for 2.10

Generated at Sat Feb 10 02:27:17 UTC 2024 using Jira 9.4.14#940014-sha1:734e6822bbf0d45eff9af51f82432957f73aa32c.