Bugzilla – Bug 1015160
VUL-0: CVE-2016-6786 CVE-2016-6787: kernel-source: Possible privilege escalation due to lack of locking around changing event->ctx
Last modified: 2022-03-31 08:09:23 UTC
via rh bugzilla Possible privilege escalation issue due to lack of mutex locking around places where perf_event::ctx is being changed. Upstream patch: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f63a8daa5812afef4f06c962351687e1ff9ccb2b References: https://bugzilla.redhat.com/show_bug.cgi?id=1403842
this fix is in 4.0, so only older kernels might be affected.
bugbot adjusting priority
See also: boo #1025626 (VUL-0: CVE-2017-6001: kernel-source: Incomplete fix for CVE-2016-6786: perf/core: Fix concurrent sys_perf_event_open() vs. 'move_group' race)
Tony?
(In reply to Marcus Meissner from comment #4) > Tony? The locking changed between cve-3.12 and 4.0 which has the fix. The bug is very vague about what the issue is. "There have been a few reported issues wrt. the lack of locking around changing event->ctx. This patch tries to address those" isn't worth the risk of destabilizing an LTSS branch IMO.
We have decided to not release update for the still affected codestreams (3.x series) as to not risk destabilizing LTSS branches. Closing as WONTFIX.
Closing.