Vulnerability Name:

CVE-2015-4170 (CCN-103596)

Assigned:2015-01-19
Published:2015-01-19
Updated:2017-11-12
Summary:Race condition in the ldsem_cmpxchg function in drivers/tty/tty_ldsem.c in the Linux kernel before 3.13-rc4-next-20131218 allows local users to cause a denial of service (ldsem_down_read and ldsem_down_write deadlock) by establishing a new tty thread during shutdown of a previous tty thread.
CVSS v3 Severity:4.7 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): Required
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
6.2 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
CVSS v2 Severity:4.7 Medium (CVSS v2 Vector: AV:L/AC:M/Au:N/C:N/I:N/A:C)
3.5 Low (Temporal CVSS v2 Vector: AV:L/AC:M/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
4.7 Medium (CCN CVSS v2 Vector: AV:L/AC:M/Au:N/C:N/I:N/A:C)
3.5 Low (CCN Temporal CVSS v2 Vector: AV:L/AC:M/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
4.7 Medium (REDHAT CVSS v2 Vector: AV:L/AC:M/Au:N/C:N/I:N/A:C)
3.5 Low (REDHAT Temporal CVSS v2 Vector: AV:L/AC:M/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
Vulnerability Type:CWE-362
CWE-667
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2015-4170

Source: CCN
Type: Linux Kernel GIT Repository
tty: Fix hang at ldsem_down_read()

Source: CONFIRM
Type: Vendor Advisory
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cf872776fc84128bb779ce2b83a37c884c3203ae

Source: CCN
Type: RHSA-2016-1395
Moderate: kernel security and bug fix update

Source: CCN
Type: oss-security Mailing List, Tue, 26 May 2015 02:18:53 -0400 (EDT)
CVE request: vulnerability in the kernel tty subsystem

Source: CCN
Type: oss-security Mailing List, Wed, 3 Jun 2015 01:44:57 -0400 (EDT)
Re: CVE request: vulnerability in the kernel tty subsystem

Source: MLIST
Type: UNKNOWN
[oss-security] 20150526 CVE request: vulnerability in the kernel tty subsystem.

Source: CONFIRM
Type: UNKNOWN
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html

Source: BID
Type: UNKNOWN
74820

Source: CCN
Type: BID-74820
Linux Kernel 'tty/tty_ldsem.c' Local Race Condition Vulnerability

Source: REDHAT
Type: Third Party Advisory
RHSA-2016:1395

Source: CCN
Type: Red Hat Bugzilla – Bug 1218879
(CVE-2015-4170) CVE-2015-4170 kernel: pty layer race condition on tty ldisc shutdown

Source: CONFIRM
Type: Issue Tracking, VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=1218879

Source: XF
Type: UNKNOWN
linux-kernel-cve20154170-dos(103596)

Source: CONFIRM
Type: UNKNOWN
https://github.com/torvalds/linux/commit/cf872776fc84128bb779ce2b83a37c884c3203ae

Source: CONFIRM
Type: Patch
https://www.kernel.org/pub/linux/kernel/next/patch-v3.13-rc4-next-20131218.xz

Vulnerable Configuration:Configuration 1:
  • cpe:/o:linux:linux_kernel:*:*:*:*:*:*:*:* (Version <= 3.13.3)

  • Configuration 2:
  • cpe:/o:redhat:enterprise_linux_compute_node_eus:7.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.1_s390x:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_for_power_big_endian_eus:7.1_ppc64:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_for_power_little_endian_eus:7.1_ppc64le:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server_eus:7.1:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:7:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:7::client:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:7::computenode:*:*:*:*:*

  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:7::server:*:*:*:*:*

  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:7::workstation:*:*:*:*:*

  • Configuration RedHat 6:
  • cpe:/a:redhat:rhel_extras_rt:7:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:linux:linux_kernel:*:*:*:*:*:*:*:*
  • AND
  • cpe:/o:redhat:enterprise_linux_hpc_node_eus:7.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server_eus:7.1:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:com.ubuntu.xenial:def:20154170000
    V
    CVE-2015-4170 on Ubuntu 16.04 LTS (xenial) - medium.
    2016-05-02
    oval:com.ubuntu.xenial:def:201541700000000
    V
    CVE-2015-4170 on Ubuntu 16.04 LTS (xenial) - medium.
    2016-05-02
    oval:com.ubuntu.precise:def:20154170000
    V
    CVE-2015-4170 on Ubuntu 12.04 LTS (precise) - medium.
    2016-05-02
    oval:com.ubuntu.trusty:def:20154170000
    V
    CVE-2015-4170 on Ubuntu 14.04 LTS (trusty) - medium.
    2016-05-02
    oval:com.redhat.rhsa:def:20152152
    P
    RHSA-2015:2152: kernel security, bug fix, and enhancement update (Important)
    2015-11-19
    oval:com.redhat.rhsa:def:20152411
    P
    RHSA-2015:2411: kernel-rt security, bug fix, and enhancement update (Important)
    2015-11-19
    BACK
    linux linux kernel *
    redhat enterprise linux compute node eus 7.1
    redhat enterprise linux for ibm z systems eus 7.1_s390x
    redhat enterprise linux for power big endian eus 7.1_ppc64
    redhat enterprise linux for power little endian eus 7.1_ppc64le
    redhat enterprise linux server eus 7.1
    linux linux kernel *
    redhat enterprise linux hpc node eus 7.1
    redhat enterprise linux server eus 7.1