Bug 2070694 (CVE-2022-1199)

Summary: CVE-2022-1199 kernel: Null pointer dereference and use after free in ax25_release()
Product: [Other] Security Response Reporter: Pedro Sampaio <psampaio>
Component: vulnerabilityAssignee: Nobody <nobody>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: acaringi, adscvr, airlied, alciregi, bdettelb, bhu, carnil, chwhite, crwood, dvlasenk, hdegoede, hkrzesin, hpa, jarod, jarodwilson, jburrell, jfaracco, jforbes, jglisse, jlelli, joe.lawrence, jonathan, josef, jshortt, jstancek, jwboyer, jwyatt, kcarcia, kernel-maint, kernel-mgr, lgoncalv, linville, lzampier, masami256, mchehab, mleitner, nmurray, ptalbert, qzhao, rvrbovsk, scweaver, steved, vkumar, walters, williams
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: kernel v 5.18-rc4 Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in the Linux kernel. This flaw allows an attacker to crash the Linux kernel by simulating amateur radio from the user space, resulting in a null-ptr-deref vulnerability and a use-after-free vulnerability.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2079085, 2070695, 2079079, 2079080, 2079081, 2079083, 2079084, 2079086    
Bug Blocks: 2070696, 2070697    

Description Pedro Sampaio 2022-03-31 16:58:10 UTC
There are null-ptr-deref vulnerability and use-after-free vulnerability that allow attacker to crash linux kernel by simulating Amateur Radio from user-space of linux.

Upstream fix:

https://github.com/torvalds/linux/commit/4e0f718daf97d47cf7dec122da1be970f145c809
https://github.com/torvalds/linux/commit/71171ac8eb34ce7fe6b3267dce27c313ab3cb3ac
https://github.com/torvalds/linux/commit/7ec02f5ac8a5be5a3f20611731243dc5e1d9ba10

Comment 1 Pedro Sampaio 2022-03-31 16:58:37 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 2070695]

Comment 2 Justin M. Forbes 2022-03-31 21:46:33 UTC
This was fixed for Fedora with the 5.16.15 stable kernel updates.

Comment 3 Salvatore Bonaccorso 2022-04-02 11:55:08 UTC
https://www.openwall.com/lists/oss-security/2022/04/02/5