Bug 2044524 (CVE-2021-34403)

Summary: CVE-2021-34403 kernel: NVIDIA Linux use after free in nvmap ioctl
Product: [Other] Security Response Reporter: Pedro Sampaio <psampaio>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED NOTABUG QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: acaringi, adscvr, airlied, alciregi, bhu, brdeoliv, bskeggs, chwhite, crwood, dhoward, dvlasenk, fhrbata, fpacheco, hdegoede, hkrzesin, jarod, jarodwilson, jburrell, jeremy, jfaracco, jforbes, jglisse, jlelli, joe.lawrence, jonathan, josef, jshortt, jstancek, jwboyer, kcarcia, kernel-maint, kernel-mgr, lgoncalv, linville, lzampier, masami256, mchehab, nmurray, ptalbert, qzhao, rvrbovsk, scweaver, steved, vkumar, walters, williams
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2022-01-26 19:30:56 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2044525    
Bug Blocks: 2044526    

Description Pedro Sampaio 2022-01-24 17:57:39 UTC
NVIDIA Linux distributions contain a vulnerability in nvmap ioctl, which allows
any user with a local account to exploit a use-after-free condition, leading to
code privilege escalation, loss of confidentiality and integrity, or denial of
service.

References:

https://nvidia.custhelp.com/app/answers/detail/a_id/5259

Comment 1 Pedro Sampaio 2022-01-24 17:58:30 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 2044525]

Comment 2 Justin M. Forbes 2022-01-25 17:36:49 UTC
This is in a vulnerability in code that nvidia has not put upstream.

Comment 3 juneau 2022-01-26 13:46:18 UTC
Hosted OpenShift/Managed Services notaffected.

Comment 5 Product Security DevOps Team 2022-01-26 19:30:52 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2021-34403