Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 10 May 2021 15:28:02 +0930
From: Alex Murray <alex.murray@...onical.com>
To: oss-security@...ts.openwall.com
Cc: Nadav Markus <nmarkus@...oaltonetworks.com>, Or Cohen
 <orcohen@...oaltonetworks.com>, Salvatore Bonaccorso <carnil@...ian.org>
Subject: Re: CVE-2021-23133: Linux kernel: race condition in
 sctp sockets


On Mon, 2021-05-10 at 13:54:43 +0930, Salvatore Bonaccorso wrote:

> Hi,
>
> On Sun, Apr 18, 2021 at 11:41:06AM +0300, Or Cohen wrote:
>> Hello,
>> 
>> This is an announcement about CVE-2021-23133 which is a race-condition
>> I found in Linux kernel sctp sockets (net/sctp/socket.c). It can lead to 
>> kernel
>> privilege escalation from the context of a network service or from
>> an unprivileged process if certain conditions are met.
>> 
>> The bug was fixed on April 13, 2021:
>> https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b166a20b07382b8bc1dcee2a448715c9c2c81b5b
>
> It looks that additionally
> https://git.kernel.org/linus/34e5b01186858b36c4d7c87e1a025071e8e2401f
> refer to CVE-2021-23133.

It seems b166a20b07382b8bc1dcee2a448715c9c2c81b5b got reverted in the
follow-up commit
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/sctp/socket.c?id=01bfe5e8e428b475982a98a46cca5755726f3f7f
and so 34e5b01186858b36c4d7c87e1a025071e8e2401f would appear to be the
most correct fix from what I can tell.

>
> Are both commits necessary?
>
> Regards,
> Salvatore

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.