Bug 1218879 (CVE-2015-4170) - CVE-2015-4170 kernel: pty layer race condition on tty ldisc shutdown.
Summary: CVE-2015-4170 kernel: pty layer race condition on tty ldisc shutdown.
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2015-4170
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1183479 1248300 1248301 1248302 1278751 1332164 1343555
Blocks: 1188620
TreeView+ depends on / blocked
 
Reported: 2015-05-06 06:29 UTC by Wade Mealing
Modified: 2021-02-17 05:20 UTC (History)
40 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
A flaw was discovered in the way the Linux kernel's TTY subsystem handled the tty shutdown phase. A local, unprivileged user could use this flaw to cause denial of service on the system by holding a reference to the ldisc lock during tty shutdown, causing a deadlock.
Clone Of:
Environment:
Last Closed: 2016-07-12 15:14:10 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2015:2152 0 normal SHIPPED_LIVE Important: kernel security, bug fix, and enhancement update 2015-11-20 00:56:02 UTC
Red Hat Product Errata RHSA-2015:2411 0 normal SHIPPED_LIVE Important: kernel-rt security, bug fix, and enhancement update 2015-11-19 11:24:06 UTC
Red Hat Product Errata RHSA-2016:1395 0 normal SHIPPED_LIVE Moderate: kernel security and bug fix update 2016-07-12 13:24:59 UTC

Description Wade Mealing 2015-05-06 06:29:14 UTC
An issue was discovered in the linux kernel's tty subsystem handling during shutdown. The flaw was possible to take a reference to the ldisc during shutdown phase.

This race occurs on hangup of tty.  It races and hangs on ldsem_down_write on a semaphore that is being aquired by a new reader(CPU 1).  The new reader/writer is sleeping in ldsem_down_read() and the hangup is sleeping in ldsem_down_write().

Resources:

Fix: http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cf872776fc84128bb779ce2b83a37c884c3203ae
CVE request: http://seclists.org/oss-sec/2015/q2/545

Comment 1 Wade Mealing 2015-05-28 04:04:48 UTC
Statement:

This issue does not affect the Linux kernels as shipped with Red Hat Enterprise Linux 5, 6.

This issue affects the Linux kernel packages kernel as shipped with Red Hat Enterprise Linux 7 and Red Hat Enterprise MRG 2.

Comment 7 errata-xmlrpc 2015-11-19 13:19:22 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2015:2411 https://rhn.redhat.com/errata/RHSA-2015-2411.html

Comment 8 errata-xmlrpc 2015-11-19 22:15:15 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2015:2152 https://rhn.redhat.com/errata/RHSA-2015-2152.html

Comment 11 errata-xmlrpc 2016-07-12 09:25:14 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7.1 Extended Update Support

Via RHSA-2016:1395 https://access.redhat.com/errata/RHSA-2016:1395


Note You need to log in before you can comment on or make changes to this bug.