Bug 2112693 (CVE-2020-36558) - CVE-2020-36558 kernel: race condition in VT_RESIZEX ioctl when vc_cons[i].d is already NULL leading to NULL pointer dereference
Summary: CVE-2020-36558 kernel: race condition in VT_RESIZEX ioctl when vc_cons[i].d i...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2020-36558
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2068338 2112694 2112695 2112696 2112697 2233515 2274389
Blocks: 2109700
TreeView+ depends on / blocked
 
Reported: 2022-07-31 17:29 UTC by Alex
Modified: 2024-04-30 16:24 UTC (History)
52 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2022-12-04 05:04:02 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Knowledge Base (Solution) 7059342 0 None None None 2024-03-08 00:30:38 UTC
Red Hat Product Errata RHBA-2024:2615 0 None None None 2024-04-30 16:24:11 UTC
Red Hat Product Errata RHSA-2022:7444 0 None None None 2022-11-08 09:10:25 UTC
Red Hat Product Errata RHSA-2022:7683 0 None None None 2022-11-08 10:10:01 UTC
Red Hat Product Errata RHSA-2023:5627 0 None None None 2023-10-10 16:26:12 UTC
Red Hat Product Errata RHSA-2024:2003 0 None None None 2024-04-23 15:43:01 UTC
Red Hat Product Errata RHSA-2024:2004 0 None None None 2024-04-23 16:38:51 UTC

Description Alex 2022-07-31 17:29:56 UTC
A NULL pointer dereference vulnerability was found in drivers/tty/vt/vt_ioctl.c in the Linux kernel before 5.5.7.
A race condition when call to VT_RESIZEX ioctl and vc_cons[i].d is already NULL could lead to crash.

Reference:
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6cd1ed50efd88261298577cd92a14f2768eddeeb

Comment 3 errata-xmlrpc 2022-11-08 09:10:23 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2022:7444 https://access.redhat.com/errata/RHSA-2022:7444

Comment 4 errata-xmlrpc 2022-11-08 10:09:58 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2022:7683 https://access.redhat.com/errata/RHSA-2022:7683

Comment 5 Product Security DevOps Team 2022-12-04 05:03:58 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2020-36558

Comment 11 errata-xmlrpc 2023-10-10 16:26:08 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Extended Update Support

Via RHSA-2023:5627 https://access.redhat.com/errata/RHSA-2023:5627

Comment 13 Alex 2024-04-10 19:20:43 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 2274389]

Comment 16 errata-xmlrpc 2024-04-23 15:42:58 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2024:2003 https://access.redhat.com/errata/RHSA-2024:2003

Comment 17 errata-xmlrpc 2024-04-23 16:38:48 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2024:2004 https://access.redhat.com/errata/RHSA-2024:2004


Note You need to log in before you can comment on or make changes to this bug.