SVG:Advisory-SVG-CVE-2016-7117
Jump to navigation
Jump to search
Main page | Software Security Checklist | Issue Handling | Advisories | Notes On Risk | Advisory Template | More |
Advisory-SVG-CVE-2016-7117
Title: EGI SVG 'Heads up' [TLP:WHITE ] CRITICAL risk CVE-2016-7117 Linux kernel vulnerability [EGI-SVG-CVE-2016-7117] Date: 2016-11-10 Updated: Affected software and risk ========================== 'CRITICAL' risk vulnerability concerning the Linux kernel Use-after-free in the recvmmsg exit path. Package : Linux Kernel CVE ID : CVE-2016-7117 A 'use after free' vulnerability was found in the kernels socket recvmmsg subsystem. This may allow a local root exploit and potentially also remote arbitrary code execution. Updates are available for most Linux distributions except RedHat and its derivatives. Actions required/recommended ============================ Sites should apply vendor kernel updates as soon as patches are available for the operating system they are running. It is not necessary for sites to reply to this 'Heads up' EGI CSIRT monitors sites for High Risk and Critical risk vulnerabilities, and it is important that you respond to any request from EGI CSIRT directed to your site. Sites failing to act on requests from the EGI CSIRT team risk suspension. Affected software details ========================= All Linux distributions, see relevant OS providers. More information ================ For more information see [R 1], [R 2], [R 3] At present no working root exploit has been made public. This is a mitigating circumstance. Some members of SVG consider it likely that one may be made public at any time, hence the assessment of 'Critical'. For this reason we recommend sites update as soon as possible. Mitigation ========== There is no recommended mitigation to prevent this vulnerability being exploited. Component installation information ================================== Sites running Debian should see [R 5] Sites running Ubuntu should see [R 6] Sites running RedHat should see [R 2], [R 4] (Patch is not available yet.) Sites running Scientific Linux (SL) should see [R 7] (Patch is not available yet.) TLP and URL =========== ** WHITE information - Unlimited distribution - see https://wiki.egi.eu/wiki/EGI_CSIRT:TLP for distribution restrictions*** URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2016-7117 Minor updates may be made without re-distribution to the sites Credit ====== SVG was alerted to this vulnerability by Sebastien Gadrat. References ========== [R 1] https://blog.lizzie.io/notes-about-cve-2016-7117.html [R 2] https://bugzilla.redhat.com/show_bug.cgi?id=1382268 [R 3] https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-7117 [R 4] https://access.redhat.com/security/cve/cve-2016-7117 [R 5] https://security-tracker.debian.org/tracker/CVE-2016-7117 [R 6] http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-7117.html [R 7] https://www.scientificlinux.org/ Comments and questions ====================== Questions about the operational follow up of this vulnerability should be sent to abuse@egi.eu Comments or questions about the vulnerability itself should be sent to svg-rat at mailman.egi.eu If you find or become aware of a vulnerability which is relevant to EGI you may report it by e-mail to report-vulnerability at egi.eu the EGI Software Vulnerability Group will take a look. Timeline ======== Yyyy-mm-dd [EGI-SVG-CVE-2016-7117] 2016-10-20 SVG alerted to this issue by Sebastien Gadrat. 2016-10-20 Acknowledgement from the EGI SVG to the reporter 2016-10--- Investigation of vulnerability and relevance to EGI carried out. 2016-11-07 EGI SVG Risk Assessment completed. 2016-11-10 'Heads up' sent to sites