Bug 1311566 (CVE-2016-2547) - CVE-2016-2547 kernel: sound: use-after-free in snd_timer_user_ioctl
Summary: CVE-2016-2547 kernel: sound: use-after-free in snd_timer_user_ioctl
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2016-2547
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
: CVE-2016-2548 (view as bug list)
Depends On: 1288993 1311573
Blocks: 1311575
TreeView+ depends on / blocked
 
Reported: 2016-02-24 13:26 UTC by Andrej Nemec
Modified: 2021-02-17 04:18 UTC (History)
33 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2016-03-08 11:10:31 UTC
Embargoed:


Attachments (Terms of Use)

Description Andrej Nemec 2016-02-24 13:26:59 UTC
A slave timer instance might be still accessible in a racy way while operating the master instance as it lacks of locking. Since the master operation is mostly protected with timer->lock, we should cope with it while changing the slave instance, too.

Upstream patch:

http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b5a663aa426f4884c71cd8580adae73f33570f0d

External references:

http://marc.info/?l=linux-kernel&m=145269654327048
https://gist.githubusercontent.com/dvyukov/e833610757b098956b50/raw/d819cd13b466e4adbe3dd825ee481e4512e77633/gistfile1.txt

CVE-ID request and assignment:

http://seclists.org/oss-sec/2016/q1/133

http://seclists.org/oss-sec/2016/q1/410

Comment 1 Josh Boyer 2016-02-24 13:57:34 UTC
This was fixed in 4.3.5 with:

commit ea7f3d59628930dc29482a292e2a55c81cac52a4
Author: Takashi Iwai <tiwai>
Date:   Thu Jan 14 16:30:58 2016 +0100

    ALSA: timer: Harden slave timer list handling
    
    commit b5a663aa426f4884c71cd8580adae73f33570f0d upstream.
    

and in 4.4.1 with:

commit 8eff3aa0a9bbb593dce0ec0344ec1961318e44c8
Author: Takashi Iwai <tiwai>
Date:   Thu Jan 14 16:30:58 2016 +0100

    ALSA: timer: Harden slave timer list handling
    
    commit b5a663aa426f4884c71cd8580adae73f33570f0d upstream.

All Fedora branches are on those or newer.  This issue is fixed in Fedora.

Comment 3 Vladis Dronov 2016-03-08 11:10:31 UTC
Statement:

This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.

This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 7 and MRG-2, as the flaw was already fixed in the products listed.

Comment 4 Vladis Dronov 2016-03-11 17:55:26 UTC
*** Bug 1311568 has been marked as a duplicate of this bug. ***


Note You need to log in before you can comment on or make changes to this bug.