Unexpected locking behavior leads to a use-after-free vulnerability in function sco_sock_sendmsg() allowing the attacker to inject a malicious payload.
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1984957]
Hello there, I asked the reporter via email. (sorry for the dealy, I was PTO last week)
(In reply to Marian Rehak from comment #11) > Hello there, > I asked the reporter via email. (sorry for the dealy, I was PTO last week) Any update on this ? thanks Gopal
In reply to comment #13: > > (In reply to Marian Rehak from comment #11) > > Hello there, > > I asked the reporter via email. (sorry for the dealy, I was PTO last week) > > Any update on this ? > > thanks > Gopal The patch is this one: https://lkml.org/lkml/2021/8/28/238 (but looks like not applied yet: https://lore.kernel.org/lkml/20211109010649.1191041-2-sashal@kernel.org/T/ )
This was fixed for Fedora with the 5.15.3 stable kernel updates.
In reply to comment #14: > In reply to comment #13: > > > > (In reply to Marian Rehak from comment #11) > > > Hello there, > > > I asked the reporter via email. (sorry for the dealy, I was PTO last week) > > > > Any update on this ? > > > > thanks > > Gopal > > The patch is this one: > https://lkml.org/lkml/2021/8/28/238 > > (but looks like not applied yet: > https://lore.kernel.org/lkml/20211109010649.1191041-2-sashal@kernel.org/T/ > ) Additional patch that removed buggy code (simplifying the logic): https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/bluetooth/sco.c?h=v5.16&id=0771cbb3b97d3c1d68eecd7f00055f599954c34e
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2022:7444 https://access.redhat.com/errata/RHSA-2022:7444
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2022:7683 https://access.redhat.com/errata/RHSA-2022:7683
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2022:7933 https://access.redhat.com/errata/RHSA-2022:7933
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2022:8267 https://access.redhat.com/errata/RHSA-2022:8267
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2021-3640