{
  "threat_severity" : "Important",
  "public_date" : "2016-05-07T00:00:00Z",
  "bugzilla" : {
    "description" : "kernel: infiniband: Unprivileged process can overwrite kernel memory using rdma_ucm.ko",
    "id" : "1310570",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1310570"
  },
  "cvss" : {
    "cvss_base_score" : "6.9",
    "cvss_scoring_vector" : "AV:L/AC:M/Au:N/C:C/I:C/A:C",
    "status" : "verified"
  },
  "cvss3" : {
    "cvss3_base_score" : "7.8",
    "cvss3_scoring_vector" : "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-119",
  "details" : [ "The InfiniBand (aka IB) stack in the Linux kernel before 4.5.3 incorrectly relies on the write system call, which allows local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface.", "A flaw was found in the way certain interfaces of the Linux kernel's Infiniband subsystem used write() as bi-directional ioctl() replacement, which could lead to insufficient memory security checks when being invoked using the splice() system call. A local unprivileged user on a system with either Infiniband hardware present or RDMA Userspace Connection Manager Access module explicitly loaded, could use this flaw to escalate their privileges on the system." ],
  "statement" : "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5.\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG-2. Future Linux kernel updates for the respective releases might address this issue.",
  "acknowledgement" : "Red Hat would like to thank Jann Horn for reporting this issue.",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 6",
    "release_date" : "2016-07-12T00:00:00Z",
    "advisory" : "RHSA-2016:1406",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6",
    "package" : "kernel-0:2.6.32-642.3.1.el6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6.2 Advanced Update Support",
    "release_date" : "2016-08-16T00:00:00Z",
    "advisory" : "RHSA-2016:1617",
    "cpe" : "cpe:/o:redhat:rhel_mission_critical:6.2",
    "package" : "kernel-0:2.6.32-220.67.1.el6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6.4 Advanced Update Support",
    "release_date" : "2016-08-09T00:00:00Z",
    "advisory" : "RHSA-2016:1581",
    "cpe" : "cpe:/o:redhat:rhel_aus:6.4",
    "package" : "kernel-0:2.6.32-358.72.1.el6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6.5 Advanced Update Support",
    "release_date" : "2016-09-06T00:00:00Z",
    "advisory" : "RHSA-2016:1814",
    "cpe" : "cpe:/o:redhat:rhel_aus:6.5",
    "package" : "kernel-0:2.6.32-431.73.2.el6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6.6 Extended Update Support",
    "release_date" : "2016-08-19T00:00:00Z",
    "advisory" : "RHSA-2016:1640",
    "cpe" : "cpe:/o:redhat:rhel_eus:6.6",
    "package" : "kernel-0:2.6.32-504.51.1.el6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6.7 Extended Update Support",
    "release_date" : "2016-07-26T00:00:00Z",
    "advisory" : "RHSA-2016:1489",
    "cpe" : "cpe:/o:redhat:rhel_eus:6.7",
    "package" : "kernel-0:2.6.32-573.32.1.el6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "release_date" : "2016-06-23T00:00:00Z",
    "advisory" : "RHSA-2016:1301",
    "cpe" : "cpe:/a:redhat:rhel_extras_rt:7",
    "package" : "kernel-rt-0:3.10.0-327.22.2.rt56.230.el7_2"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "release_date" : "2016-06-23T00:00:00Z",
    "advisory" : "RHSA-2016:1277",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7",
    "package" : "kernel-0:3.10.0-327.22.2.el7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7.1 Extended Update Support",
    "release_date" : "2016-08-23T00:00:00Z",
    "advisory" : "RHSA-2016:1657",
    "cpe" : "cpe:/o:redhat:rhel_eus:7.1",
    "package" : "kernel-0:3.10.0-229.40.1.ael7b"
  }, {
    "product_name" : "Red Hat Enterprise MRG 2",
    "release_date" : "2016-06-27T00:00:00Z",
    "advisory" : "RHSA-2016:1341",
    "cpe" : "cpe:/a:redhat:enterprise_mrg:2:server:el6",
    "package" : "kernel-rt-1:3.10.0-327.rt56.190.el6rt"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 5",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2016-4565\nhttps://nvd.nist.gov/vuln/detail/CVE-2016-4565" ],
  "name" : "CVE-2016-4565",
  "csaw" : false
}