First published: Mon Feb 22 2016(Updated: )
It was reported that drivers/infiniband stack uses write() as a replacement for bi-directional ioctl(), which is not safe. There are ways to trigger write calls that result in the return structure that is normally written to user space being shunted off to user specified kernel memory instead. A local unprivileged user on a system with rdma_ucm module loaded could use this flaw to escalate their privileges. Upstream patch: <a href="https://git.kernel.org/linus/e6bd18f57aad1a2d1ef40e646d03ed0f2515c9e3">https://git.kernel.org/linus/e6bd18f57aad1a2d1ef40e646d03ed0f2515c9e3</a> CVE-ID request and assignment: <a href="http://seclists.org/oss-sec/2016/q2/269">http://seclists.org/oss-sec/2016/q2/269</a> <a href="http://seclists.org/oss-sec/2016/q2/274">http://seclists.org/oss-sec/2016/q2/274</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Linux kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1310570 is considered high due to potential arbitrary memory access risks.
To fix REDHAT-BUG-1310570, update to the latest patched version of the affected Linux kernel.
REDHAT-BUG-1310570 affects systems running the vulnerable versions of the Linux kernel utilizing the infiniband stack.
Exploiting REDHAT-BUG-1310570 can lead to unauthorized access to kernel memory and potential system compromise.
You can determine if your system is vulnerable to REDHAT-BUG-1310570 by checking your kernel version against the known vulnerable versions.