An use-after-free was found in the Linux kernel in the implementation of nfc sockets (in net/nfc/llcp_sock.c). This can lead to kernel privilege escalation from the context of an unprivileged user. Reference: https://www.openwall.com/lists/oss-security/2021/05/11/4 Upstream patch: https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=c61760e6940d
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1959515]
External References: https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=c61760e6940d
Statement: This flaw is rated as having a Moderate impact because in the default configuration, the issue can only be triggered by a privileged local user (with capability CAP_NET_RAW).
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2021-23134