Bug 1288934 (CVE-2015-7553) - CVE-2015-7553 kernel: nfnetlink race in NETLINK_NFLOG socket creation
Summary: CVE-2015-7553 kernel: nfnetlink race in NETLINK_NFLOG socket creation
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2015-7553
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1235978 1288936 1288937 1290279
Blocks: 1254622
TreeView+ depends on / blocked
 
Reported: 2015-12-07 04:20 UTC by Wade Mealing
Modified: 2021-10-21 00:49 UTC (History)
16 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
A race-condition flaw was discovered in the kernel's netlink module creation, which can trigger a kernel panic in netlink_release->module_put for local users creating netlink sockets. The flaw is specific to Red Hat Enterprise Linux and does not affect upstream kernels. The nfnetlink_log module must be loaded before the flaw can occur.
Clone Of:
Environment:
Last Closed: 2021-10-21 00:49:10 UTC
Embargoed:


Attachments (Terms of Use)

Description Wade Mealing 2015-12-07 04:20:24 UTC
A race condition in netlink socket creation can trigger a kernel panic in netlink_release->module_put for local users creating netlink sockets.

This issue is specific to Red Hat Enterprise Linux and does not affect upstream kernels.  This issue was introduced in commit 3500659804251facce0cf4ee2ca657e0108e9a4f.  This was introduced in kernel-3.10.0-304.el7 in the fix titled:

[net] netfilter: log: protect nf_log_register against double registering.

It requires the nfnetlink_log module to be loaded to be effective.

This commit was introduced as part of a patchset that was required to backport netfilter functionality from upstream while attempting to maintain KABI.  This flaw is RHEL specific.

Comment 6 Wade Mealing 2015-12-10 02:23:20 UTC
Statement:

This issue does not affect Red Hat Enterprise Linux 5 and 6.

This issue affects the Linux kernels as shipped with Red Hat Enterprise Linux  7, kernel-rt and Red Hat Enterprise MRG 2 and may be addressed in a future update.


Note You need to log in before you can comment on or make changes to this bug.