Integer overflow in the mem_check_range function in drivers/infiniband/sw/rxe/rxe_mr.c in the Linux kernel before 4.9.10 allows local users to cause a denial of service (memory corruption), obtain sensitive information from kernel memory, or possibly have unspecified other impact via a write or read request involving the "RDMA protocol over infiniband" (aka Soft RoCE) technology.
The product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value that is too large to store in the associated representation. When this occurs, the value may become a very small or negative number.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/96189 | third party advisory vdb entry |
http://www.openwall.com/lists/oss-security/2017/02/11/9 | patch mailing list third party advisory |
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.10 | release notes vendor advisory |
https://eyalitkin.wordpress.com/2017/02/11/cve-publication-cve-2016-8636/ | patch third party advisory technical description |
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=647bf3d8a8e5777319da92af672289b2a6c4dc66 | patch third party advisory issue tracking |
https://bugzilla.redhat.com/show_bug.cgi?id=1421981 | patch issue tracking |
https://github.com/torvalds/linux/commit/647bf3d8a8e5777319da92af672289b2a6c4dc66 | patch third party advisory issue tracking |