Bug 1267261 (CVE-2015-8324)

Summary: CVE-2015-8324 kernel: Null pointer dereference when mounting ext4
Product: [Other] Security Response Reporter: Adam Mariš <amaris>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: agordeev, aquini, bhu, dhoward, esammons, fhrbata, iboverma, jkacur, joelsmith, jross, kernel-mgr, kstutsma, lgoncalv, lwang, matt, mcressma, mguzik, nmurray, pholasek, plougher, rvrbovsk, security-response-team, slong, vdronov, williams
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
A NULL pointer dereference flaw was found in the way the Linux kernel's ext4 file system driver handled certain corrupted file system images. An attacker with physical access to the system could use this flaw to crash the system.
Story Points: ---
Clone Of: Environment:
Last Closed: 2015-11-24 10:22:42 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1266862    
Bug Blocks: 1267262    

Description Adam Mariš 2015-09-29 13:31:54 UTC
It was reported that there are some exit points in ext4_fill_super which result in destruction of workqueue which is not yet initialized, leading to kernel NULL pointer dereference.

Oops report can be found in product bug:

https://bugzilla.redhat.com/show_bug.cgi?id=1266862

CVE request:

http://seclists.org/oss-sec/2015/q4/357

CVE assignment:

http://seclists.org/oss-sec/2015/q4/360

Upstream fix (only part of the commit is related):

http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=744692dc059845b2a3022119871846e74d4f6e11

Comment 3 Vladis Dronov 2015-11-23 09:16:25 UTC
Statement:

This problem did not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 7 and MRG-2.

Comment 6 Adam Mariš 2015-12-09 09:27:04 UTC
Acknowledgements:

Red Hat would like to thank Dmitriy Monakhov of OpenVZ project for reporting this issue.

Comment 7 errata-xmlrpc 2016-05-10 23:16:47 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6

Via RHSA-2016:0855 https://rhn.redhat.com/errata/RHSA-2016-0855.html