Bug 2120595 (CVE-2022-2961)
Summary: | CVE-2022-2961 kernel: race condition in rose_bind() | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Alex <allarkin> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED NOTABUG | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | acaringi, adscvr, airlied, alciregi, bhu, brdeoliv, bskeggs, carnil, chwhite, crwood, ddepaula, debarbos, dhoward, dvlasenk, fhrbata, hdegoede, hkrzesin, hpa, jarod, jarodwilson, jburrell, jfaracco, jferlan, jforbes, jglisse, jlelli, joe.lawrence, jonathan, josef, jpazdziora, jshortt, jstancek, jwboyer, jwyatt, kcarcia, kernel-maint, kernel-mgr, lgoncalv, linville, lleshchi, lzampier, masami256, mchehab, nmurray, ptalbert, qzhao, rvrbovsk, scweaver, steve.beattie, steved, tyberry, vkumar, walters, williams |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Linux kernel 6.0-rc2 | Doc Type: | If docs needed, set a value |
Doc Text: |
A use-after-free flaw was found in the Linux kernel’s PLP Rose functionality in the way a user triggers a race condition by calling bind while simultaneously triggering the rose_bind() function. This flaw allows a local user to crash or potentially escalate their privileges on the system.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2022-09-02 16:55:53 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2120596 | ||
Bug Blocks: | 2060938 |
Description
Alex
2022-08-23 11:20:21 UTC
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 2120596] Alex, I see you've asserted that this issue is fixed in 6.0-rc2. I'm not seeing a fix between 6.0-rc1 and rc2 that addresses the issue, is it 2df91e397d85 ("net: rose: add netdev ref tracker to 'struct rose_sock'") that landed in 6.0-rc1, some other commit, or has a fix not landed yet upstream? Thanks for any clarity you can give! This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-2961 Alex, did you saw the comment from Steve Beattie? In reply to comment #4: > Alex, I see you've asserted that this issue is fixed in 6.0-rc2. I'm not > seeing a fix between 6.0-rc1 and rc2 that addresses the issue, is it > 2df91e397d85 ("net: rose: add netdev ref tracker to 'struct rose_sock'") > that landed in 6.0-rc1, some other commit, or has a fix not landed yet > upstream? > > Thanks for any clarity you can give! It is not yet fixed in the 6.0-rc1/rc2. I use for this field version where already fixed or last known affected version, because similar for the Version of the CVE from cveform.mitre.org: "Known affected or fixed in versions of the product/component. This information is often available on the flaw bug on the fixedin field". When fixed, probably good idea to update "fixedin field" field here. Hello, could this be reopened and proper investigation of the code in various RHEL kernel versions done? It is not clear on what analysis the Not affected conclusion in the CVE page https://access.redhat.com/security/cve/cve-2022-2961 was made and there are some concerns above if we have a fix and where at all. Thank you, Jan In reply to comment #8: > Hello, > > could this be reopened and proper investigation of the code in various RHEL > kernel versions done? It is not clear on what analysis the Not affected > conclusion in the CVE page > https://access.redhat.com/security/cve/cve-2022-2961 was made and there are > some concerns above if we have a fix and where at all. > > Thank you, Jan Hi Jan, The code already properly investigated by two persons: Mauro (analyst) and Petr (security arhitect). I added statement: "The Kernel config param CONFIG_AX25 enabled only for Fedora, so all versions of Red Hat Enterprise Linux are not affected.". Regards, Alex Great, thank you. As we and the evaluating lab don't have insight into the process outside of what is here or on the CVE pages, such a brief summary helps a lot. |