Bug 1288934 (CVE-2015-7553)

Summary: CVE-2015-7553 kernel: nfnetlink race in NETLINK_NFLOG socket creation
Product: [Other] Security Response Reporter: Wade Mealing <wmealing>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: aquini, carnil, cperry, dhoward, fhrbata, joelsmith, kernel-mgr, kstutsma, mbliss, nmurray, rvrbovsk, security-response-team, slawomir, slong, tgummels, wmealing
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
A race-condition flaw was discovered in the kernel's netlink module creation, which can trigger a kernel panic in netlink_release->module_put for local users creating netlink sockets. The flaw is specific to Red Hat Enterprise Linux and does not affect upstream kernels. The nfnetlink_log module must be loaded before the flaw can occur.
Story Points: ---
Clone Of: Environment:
Last Closed: 2021-10-21 00:49:10 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1235978, 1288936, 1288937, 1290279    
Bug Blocks: 1254622    

Description Wade Mealing 2015-12-07 04:20:24 UTC
A race condition in netlink socket creation can trigger a kernel panic in netlink_release->module_put for local users creating netlink sockets.

This issue is specific to Red Hat Enterprise Linux and does not affect upstream kernels.  This issue was introduced in commit 3500659804251facce0cf4ee2ca657e0108e9a4f.  This was introduced in kernel-3.10.0-304.el7 in the fix titled:

[net] netfilter: log: protect nf_log_register against double registering.

It requires the nfnetlink_log module to be loaded to be effective.

This commit was introduced as part of a patchset that was required to backport netfilter functionality from upstream while attempting to maintain KABI.  This flaw is RHEL specific.

Comment 6 Wade Mealing 2015-12-10 02:23:20 UTC
Statement:

This issue does not affect Red Hat Enterprise Linux 5 and 6.

This issue affects the Linux kernels as shipped with Red Hat Enterprise Linux  7, kernel-rt and Red Hat Enterprise MRG 2 and may be addressed in a future update.