Bug 1992810 (CVE-2021-38208)

Summary: CVE-2021-38208 kernel: NULL pointer dereference in net/nfc/llcp_sock.c by making a getsockname call after a certain type of failure of a bind call
Product: [Other] Security Response Reporter: Guilherme de Almeida Suckevicz <gsuckevi>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED WONTFIX QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: acaringi, adscvr, airlied, alciregi, bhu, blc, brdeoliv, bskeggs, chwhite, crwood, dhoward, dvlasenk, fhrbata, fpacheco, hdegoede, hkrzesin, jarod, jarodwilson, jeremy, jforbes, jlelli, jonathan, josef, jshortt, jstancek, jwboyer, kcarcia, kernel-maint, kernel-mgr, lgoncalv, linville, masami256, mchehab, mlangsdo, nmurray, pmatouse, psampaio, ptalbert, qzhao, rvrbovsk, steved, tuxmealux+redhatbz, walters, williams
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: kernel 5.13-rc5 Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in the Linux kernels NFC implementation, A NULL pointer dereference and BUG leading to a denial of service can be triggered by a local unprivileged user causing a kernel panic.
Story Points: ---
Clone Of: Environment:
Last Closed: 2022-04-18 02:57:51 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1992811, 1992937    
Bug Blocks: 1968059, 1968758, 1992812    

Description Guilherme de Almeida Suckevicz 2021-08-11 18:49:32 UTC
A flaw in the Linux kernels NFC implementation allowed local unpriviledged  users to cause a kernel panic to create a denial of service (NULL pointer dereference and BUG) by making a getsockname call after a certain type of failure of a bind call.

Reference and upstream patch:
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4ac06a1e013cf5fdd963317ffd3b968560f33bba

Comment 1 Guilherme de Almeida Suckevicz 2021-08-11 18:50:03 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 1992811]

Comment 6 Justin M. Forbes 2021-08-12 13:34:15 UTC
This was fixed for Fedora with the 5.12.10 stable kernel updates.

Comment 7 Gianluca Gabrielli 2021-08-20 09:51:40 UTC
this is a duplicate of 1968057 [0].

[0] https://bugzilla.redhat.com/show_bug.cgi?id=1968057

Comment 8 Petr Matousek 2021-08-20 10:12:27 UTC
(In reply to Gianluca Gabrielli from comment #7)
> this is a duplicate of 1968057 [0].
> 
> [0] https://bugzilla.redhat.com/show_bug.cgi?id=1968057

indeed, it looks that way. thanks Gianluca for the heads up. I'm bringing it up internally so that we can initiate the process of marking one CVE as a duplicate of the other and then we're gonna deal with the flaw bugs.

thanks!
petr

Comment 9 Petr Matousek 2021-08-24 14:48:28 UTC
*** Bug 1968057 has been marked as a duplicate of this bug. ***

Comment 10 Petr Matousek 2021-08-24 14:51:41 UTC
In reply to comment #9:
> *** Bug 1968057 has been marked as a duplicate of this bug. ***

ref: https://www.openwall.com/lists/oss-security/2021/08/24/2

Comment 12 Product Security DevOps Team 2022-04-18 02:57:48 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2021-38208