SB2016122818 - Permissions, privileges, and access controls in Linux kernel events
Published: December 28, 2016
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Permissions, privileges, and access controls (CVE-ID: CVE-2016-6786)
The vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to permissions, privileges, and access controls error within the put_ctx(), __perf_event_disable(), raw_spin_unlock_irq(), perf_event_enable(), perf_event_refresh(), perf_remove_from_owner(), perf_event_read_group(), perf_read(), perf_poll(), perf_event_for_each_child(), perf_event_for_each(), perf_event_set_output(), perf_ioctl(), perf_compat_ioctl(), perf_event_task_enable(), mutex_lock_double(), syscall_define5() and perf_pmu_migrate_context() functions in kernel/events/core.c. A local user can execute arbitrary code.
Remediation
Install update from vendor's website.
References
- https://github.com/torvalds/linux/commit/f63a8daa5812afef4f06c962351687e1ff9ccb2b
- https://bugzilla.redhat.com/show_bug.cgi?id=1403842
- http://source.android.com/security/bulletin/2016-12-01.html
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f63a8daa5812afef4f06c962351687e1ff9ccb2b
- http://www.securityfocus.com/bid/94679
- http://www.debian.org/security/2017/dsa-3791