Bug 1925588 (CVE-2021-26708)

Summary: CVE-2021-26708 kernel: race conditions caused by wrong locking in net/vmw_vsock/af_vsock.c
Product: [Other] Security Response Reporter: Dhananjay Arunesh <darunesh>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: acaringi, adscvr, airlied, alciregi, bhu, blc, bmasney, brdeoliv, bskeggs, chwhite, d.alvarez, dhoward, dramseur, dvlasenk, dvolkov, fhrbata, hdegoede, hkrzesin, itamar, jarodwilson, jeremy, jforbes, jglisse, jhunter, jlelli, jonathan, josef, jshortt, jstancek, jwboyer, kcarcia, kernel-maint, kernel-mgr, kmitts, kyoshida, lgoncalv, linville, masami256, mchehab, mgala, mjudeiki, mlangsdo, mvanderw, nmurray, ptalbert, qzhao, rvrbovsk, security-response-team, steved, unixbasis, walters, williams
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in the Linux kernel. Wrong locking in the AF_VSOCK socket can cause a local privilege escalation, bypassing SMEP and SMAP. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Story Points: ---
Clone Of: Environment:
Last Closed: 2021-04-06 17:35:33 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1925948, 1925595, 1925599, 1925600, 1925601, 1925602, 1925603, 1925949    
Bug Blocks: 1925523    

Description Dhananjay Arunesh 2021-02-05 15:55:38 UTC
A vulnerability was found in Linux Kernel, where race conditions caused by wrong locking in net/vmw_vsock/af_vsock.c

Upstream patch:

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c518adafa39f37858697ac9309c6cf1805581446

Comment 1 Petr Matousek 2021-02-05 16:14:17 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 1925595]

Comment 2 Petr Matousek 2021-02-05 16:14:59 UTC
External References:

https://www.openwall.com/lists/oss-security/2021/02/04/5

Comment 5 Petr Matousek 2021-02-05 16:25:19 UTC
Acknowledgments:

Name: Alexander Popov

Comment 7 Justin M. Forbes 2021-02-08 17:30:03 UTC
This is fixed for Fedora with the 5.10.13 stable kernel update.

Comment 8 Eric Christensen 2021-02-09 20:23:45 UTC
Statement:

This issue does affect the Red Hat Enterprise Linux 8 kernel versions kernel-4.18.0-240 onwards, starting with Red Hat Enterprise Linux 8.3 GA, which introduced VSOCK multi-transport support. Prior Red Hat Enterprise Linux kernel versions are not affected by this issue.

Comment 9 errata-xmlrpc 2021-04-06 13:58:13 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2021:1081 https://access.redhat.com/errata/RHSA-2021:1081

Comment 10 errata-xmlrpc 2021-04-06 14:17:08 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2021:1093 https://access.redhat.com/errata/RHSA-2021:1093

Comment 11 Product Security DevOps Team 2021-04-06 17:35:33 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2021-26708