Bug 1248486 (CVE-2015-4177) - CVE-2015-4177 kernel: Race conditions in collect_mounts
Summary: CVE-2015-4177 kernel: Race conditions in collect_mounts
Status: CLOSED WONTFIX
Alias: CVE-2015-4177
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard: impact=moderate,public=20150701,repor...
Keywords: Security
Depends On:
Blocks: 1224245
TreeView+ depends on / blocked
 
Reported: 2015-07-30 11:46 UTC by Wade Mealing
Modified: 2019-06-08 20:41 UTC (History)
31 users (show)

(edit)
A flaw was discovered in the kernel's collect_mounts function. If the kernel's audit subsystem called collect_mounts to audit an unmounted path, it could panic the system. With this flaw, an unprivileged user could call umount(MNT_DETACH) to launch a denial-of-service attack.
Clone Of:
(edit)
Last Closed: 2017-08-25 12:28:16 UTC


Attachments (Terms of Use)

Description Wade Mealing 2015-07-30 11:46:36 UTC
The audit subsystem can call collect_mounts, which if attempting to audit
a mountpoint which is no longer mounted can panic the system.

Upstream patch:
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cd4a40174b71acd021877341684d8bb1dc8ea4ae

CVE Request:
http://seclists.org/oss-sec/2015/q2/640

Comment 4 Wade Mealing 2015-08-20 03:51:34 UTC
Statement:

This issue does not affect the Linux kernels as shipped with Red Hat Enterprise Linux 5, 6, MRG-2, realtime and arm-kernels.

The issue is not currently planned to be addressed in Red Hat Enterprise Linux 7.


Note You need to log in before you can comment on or make changes to this bug.