Hide Forgot
Use-after-free may allow local user to partially escalate privileges.
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 2004506]
Hi Alex , Any news on this ? Thanks Gopal
In reply to comment #12: > Hi Alex , > > Any news on this ? > > Thanks > Gopal Hi Gopal, I see that "Bluetooth: fix use-after-free error in lock_sock_nested()" included to 5.10.84-1: https://packages.qa.debian.org/l/linux/news/20211209T191708Z.html , and the newer patch https://lore.kernel.org/lkml/20211115165435.133245729@linuxfoundation.org/ looks like reworked older patch https://lore.kernel.org/lkml/20210714031733.1395549-1-bobo.shaobowang@huawei.com/ Could you please check this and if this is correct, then go on with https://lore.kernel.org/lkml/20211115165435.133245729@linuxfoundation.org/ ? Thank you. Alex
(In reply to Alex from comment #13) > In reply to comment #12: > > Hi Alex , > > > > Any news on this ? > > > > Thanks > > Gopal > > Hi Gopal, > > I see that "Bluetooth: fix use-after-free error in lock_sock_nested()" > included to 5.10.84-1: > https://packages.qa.debian.org/l/linux/news/20211209T191708Z.html > , and the newer patch > https://lore.kernel.org/lkml/20211115165435.133245729@linuxfoundation.org/ > looks like reworked older patch > https://lore.kernel.org/lkml/20210714031733.1395549-1-bobo.shaobowang@huawei. > com/ > > Could you please check this and if this is correct, then go on with > https://lore.kernel.org/lkml/20211115165435.133245729@linuxfoundation.org/ > ? > > Thank you. > Alex Yeah I see https://lore.kernel.org/lkml/20211115165435.133245729@linuxfoundation.org/ merged to 5.15 commit 1bff51ea59a9afb67d2dd78518ab0582a54a472c Author: Wang ShaoBo <bobo.shaobowang> Date: Tue Aug 31 17:35:37 2021 -0700 Bluetooth: fix use-after-free error in lock_sock_nested() use-after-free error in lock_sock_nested is reported: [ 179.140137][ T3731] ===================================================== [ 179.142675][ T3731] BUG: KMSAN: use-after-free in lock_sock_nested+0x280/0x2c0 [ 179.145494][ T3731] CPU: 4 PID: 3731 Comm: kworker/4:2 Not tainted 5.12.0-rc6+ #54 [ 179.148432][ T3731] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1.1 04/0104 [ 179.151806][ T3731] Workqueue: events l2cap_chan_timeout [ 179.152730][ T3731] Call Trace: [ 179.153301][ T3731] dump_stack+0x24c/0x2e0 [ 179.154063][ T3731] kmsan_report+0xfb/0x1e0 [ 179.154855][ T3731] __msan_warning+0x5c/0xa0 [ 179.155579][ T3731] lock_sock_nested+0x280/0x2c0 [ 179.156436][ T3731] ? kmsan_get_metadata+0x116/0x180 Thanks for the details. Gopal ..
This was fixed for Fedora with the 5.15.3 stable kernel updates.
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2022:0620 https://access.redhat.com/errata/RHSA-2022:0620
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2022:0622 https://access.redhat.com/errata/RHSA-2022:0622
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2022:1975 https://access.redhat.com/errata/RHSA-2022:1975
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2022:1988 https://access.redhat.com/errata/RHSA-2022:1988
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2021-3752