{
  "threat_severity" : "Moderate",
  "public_date" : "2016-02-02T00:00:00Z",
  "bugzilla" : {
    "description" : "kernel: pipe buffer state corruption after unsuccessful atomic read from pipe",
    "id" : "1303961",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1303961"
  },
  "cvss" : {
    "cvss_base_score" : "5.4",
    "cvss_scoring_vector" : "AV:L/AC:M/Au:N/C:P/I:N/A:C",
    "status" : "verified"
  },
  "details" : [ "The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in a certain Linux kernel backport in the linux package before 3.2.73-2+deb7u3 on Debian wheezy and the kernel package before 3.10.0-229.26.2 on Red Hat Enterprise Linux (RHEL) 7.1 do not properly consider the side effects of failed __copy_to_user_inatomic and __copy_from_user_inatomic calls, which allows local users to cause a denial of service (system crash) or possibly gain privileges via a crafted application, aka an \"I/O vector array overrun.\" NOTE: this vulnerability exists because of an incorrect fix for CVE-2015-1805.", "It was found that the fix for CVE-2015-1805 incorrectly kept buffer offset and buffer length in sync on a failed atomic read, potentially resulting in a pipe buffer state corruption. A local, unprivileged user could use this flaw to crash the system or leak kernel memory to user space." ],
  "acknowledgement" : "This issue was discovered by Red Hat.",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 6",
    "release_date" : "2016-03-22T00:00:00Z",
    "advisory" : "RHSA-2016:0494",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6",
    "package" : "kernel-0:2.6.32-573.22.1.el6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6.6 Extended Update Support",
    "release_date" : "2016-04-12T00:00:00Z",
    "advisory" : "RHSA-2016:0617",
    "cpe" : "cpe:/o:redhat:rhel_eus:6.6",
    "package" : "kernel-0:2.6.32-504.46.1.el6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "release_date" : "2015-11-19T00:00:00Z",
    "advisory" : "RHSA-2015:2152",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7",
    "package" : "kernel-0:3.10.0-327.el7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7.1 Extended Update Support",
    "release_date" : "2016-02-02T00:00:00Z",
    "advisory" : "RHSA-2016:0103",
    "cpe" : "cpe:/o:redhat:rhel_eus:7.1",
    "package" : "kernel-0:3.10.0-229.26.2.ael7b"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 5",
    "fix_state" : "Will not fix",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Not affected",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise MRG 2",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/a:redhat:enterprise_mrg:2"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2016-0774\nhttps://nvd.nist.gov/vuln/detail/CVE-2016-0774" ],
  "name" : "CVE-2016-0774",
  "csaw" : false
}