First published: Mon Feb 22 2016(Updated: )
It was reported that drivers/infiniband stack uses write() as a replacement for bi-directional ioctl(), which is not safe. There are ways to trigger write calls that result in the return structure that is normally written to user space being shunted off to user specified kernel memory instead. A local unprivileged user on a system with rdma_ucm module loaded could use this flaw to escalate their privileges. Upstream patch: <a href="https://git.kernel.org/linus/e6bd18f57aad1a2d1ef40e646d03ed0f2515c9e3">https://git.kernel.org/linus/e6bd18f57aad1a2d1ef40e646d03ed0f2515c9e3</a> CVE-ID request and assignment: <a href="http://seclists.org/oss-sec/2016/q2/269">http://seclists.org/oss-sec/2016/q2/269</a> <a href="http://seclists.org/oss-sec/2016/q2/274">http://seclists.org/oss-sec/2016/q2/274</a>
Credit: security@debian.org security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | <3.2.81 | |
Linux Linux kernel | >=3.3<3.10.103 | |
Linux Linux kernel | >=3.11<3.12.61 | |
Linux Linux kernel | >=3.13<3.14.76 | |
Linux Linux kernel | >=3.15<3.16.36 | |
Linux Linux kernel | >=3.17<3.18.34 | |
Linux Linux kernel | >=3.19<4.1.25 | |
Linux Linux kernel | >=4.2<4.4.9 | |
Linux Linux kernel | >=4.5<4.5.3 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =15.10 | |
Canonical Ubuntu Linux | =16.04 | |
Debian Debian Linux | =8.0 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.11.10-1 6.12.5-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2016-4565.
The affected software is the InfiniBand (aka IB) stack in the Linux kernel before 4.5.3.
The severity of CVE-2016-4565 is high.
Local users can exploit this vulnerability by causing a denial of service (kernel memory write operation) or possibly having unspecified other impact via a uAPI interface.
To fix CVE-2016-4565, update the Linux kernel to version 4.5.3 or later.