Bug 2112693 (CVE-2020-36558) - CVE-2020-36558 kernel: race condition in VT_RESIZEX ioctl when vc_cons[i].d is already NULL leading to NULL pointer dereference
Summary: CVE-2020-36558 kernel: race condition in VT_RESIZEX ioctl when vc_cons[i].d i...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2020-36558
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2068338 2112694 2112695 2112696 2112697 2233515 2274389
Blocks: 2109700
TreeView+ depends on / blocked
 
Reported: 2022-07-31 17:29 UTC by Alex
Modified: 2024-04-10 19:24 UTC (History)
52 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A NULL pointer dereference flaw was found in the Linux kernel’s Virtual Terminal subsystem was found in how a user calls the VT_RESIZEX ioctl. This flaw allows a local user to crash the system.
Clone Of:
Environment:
Last Closed: 2022-12-04 05:04:02 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Knowledge Base (Solution) 7059342 0 None None None 2024-03-08 00:30:38 UTC
Red Hat Product Errata RHSA-2022:7444 0 None None None 2022-11-08 09:10:25 UTC
Red Hat Product Errata RHSA-2022:7683 0 None None None 2022-11-08 10:10:01 UTC
Red Hat Product Errata RHSA-2023:5627 0 None None None 2023-10-10 16:26:12 UTC

Description Alex 2022-07-31 17:29:56 UTC
A NULL pointer dereference vulnerability was found in drivers/tty/vt/vt_ioctl.c in the Linux kernel before 5.5.7.
A race condition when call to VT_RESIZEX ioctl and vc_cons[i].d is already NULL could lead to crash.

Reference:
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6cd1ed50efd88261298577cd92a14f2768eddeeb

Comment 3 errata-xmlrpc 2022-11-08 09:10:23 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2022:7444 https://access.redhat.com/errata/RHSA-2022:7444

Comment 4 errata-xmlrpc 2022-11-08 10:09:58 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2022:7683 https://access.redhat.com/errata/RHSA-2022:7683

Comment 5 Product Security DevOps Team 2022-12-04 05:03:58 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2020-36558

Comment 11 errata-xmlrpc 2023-10-10 16:26:08 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Extended Update Support

Via RHSA-2023:5627 https://access.redhat.com/errata/RHSA-2023:5627

Comment 13 Alex 2024-04-10 19:20:43 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 2274389]


Note You need to log in before you can comment on or make changes to this bug.