CVE-2021-3640: UAF in sco_send_frame function was Re: [cip-dev] New CVE entries in this week


Pavel Machek
 

Hi!

CVE-2021-3640: UAF in sco_send_frame function

5.10 and 5.15 are fixed this week.

Fixed status

mainline: [99c23da0eed4fd20cae8243f2b51e10e66aa0951]
stable/5.10: [4dfba42604f08a505f1a1efc69ec5207ea6243de]
stable/5.14: [2c2b295af72e4e30d17556375e100ae65ac0b896]
stable/5.15: [b990c219c4c9d4993ef65ea9db73d9497e70f697]
stable/5.4: [d416020f1a9cc5f903ae66649b2c56d9ad5256ab]
Interesting.

commit 99c23da0eed4fd20cae8243f2b51e10e66aa0951
Author: Takashi Iwai <tiwai@...>

Says:

This should be the last piece for fixing CVE-2021-3640 after a few
already queued fixes.

Which means more than 99c23da0eed is needed to fix this one,
unfortunately it does not give us good way to identify what commits
are needed.
Aha, but we have required information in
cip-kernel-sec/issues/CVE-2021-3640.yml. It lists patches that should
be fixing this.

Some searching in the trees reveals that one of those patches is buggy
itself, and additionaly 49d8a5606428ca0962d09050a5af81461ff90fbb is
needed.

The patches fixing this are:

~ stable/5.10: [4dfba42604f08a505f1a1efc69ec5207ea6243de,
f2f856b65ac4b77049c76c0e89ecd3a177e9fcd1,
98d44b7be6f1bcfd4f824c5f8bc2b742f890879f,
c20d8c197454068da758a83e09d93683f520d681,
a1073aad497d0d071a71f61b721966a176d50c08]

But we still miss backport of 27c24fda62b6 ("Bluetooth: switch to
lock_sock in SCO") to 5.10, which has its own prerequisites
according to the changelog. AFAICT those prerequisites are
734bc5ff783115aa3164f4e9dd5967ae78e0a8ab and
ba316be1b6a00db7126ed9a39f9bee434a508043, and both are in 5.10.

I'm not sure how to express this in yml cleanly. I came with this:

diff --git a/issues/CVE-2021-3640.yml b/issues/CVE-2021-3640.yml
index fb52d5a..d386093 100644
--- a/issues/CVE-2021-3640.yml
+++ b/issues/CVE-2021-3640.yml
@@ -23,9 +23,23 @@ comments:
there is no fixed information as of 2021/07/26.
Fixed in bluetooth-next tree. commit 99c23da0eed4fd20cae8243f2b51e10e66aa0951.
ubuntu/sbeattie: Possibly addressed by Desmond Cheong Zhi Xi's patchset.
+ pavel: We are one patch away from fixing this 5.10, 27c24fda62b6 is needed.
fixed-by:
- mainline: [99c23da0eed4fd20cae8243f2b51e10e66aa0951]
- stable/5.10: [4dfba42604f08a505f1a1efc69ec5207ea6243de]
+ mainline: [99c23da0eed4fd20cae8243f2b51e10e66aa0951,
+ e04480920d1eec9c061841399aa6f35b6f987d8b,
+ 734bc5ff783115aa3164f4e9dd5967ae78e0a8ab,
+ 49d8a5606428ca0962d09050a5af81461ff90fbb,
+ ba316be1b6a00db7126ed9a39f9bee434a508043,
+ 27c24fda62b601d6f9ca5e992502578c4310876f,
+ 734bc5ff783115aa3164f4e9dd5967ae78e0a8ab,
+ ba316be1b6a00db7126ed9a39f9bee434a508043]
+ stable/5.10: [4dfba42604f08a505f1a1efc69ec5207ea6243de,
+ f2f856b65ac4b77049c76c0e89ecd3a177e9fcd1,
+ 98d44b7be6f1bcfd4f824c5f8bc2b742f890879f,
+ c20d8c197454068da758a83e09d93683f520d681,
+ a1073aad497d0d071a71f61b721966a176d50c08,
+ 98d44b7be6f1bcfd4f824c5f8bc2b742f890879f,
+ a1073aad497d0d071a71f61b721966a176d50c08]
stable/5.14: [2c2b295af72e4e30d17556375e100ae65ac0b896]
stable/5.15: [b990c219c4c9d4993ef65ea9db73d9497e70f697]
stable/5.4: [d416020f1a9cc5f903ae66649b2c56d9ad5256ab]

Best regards,
Pavel
--
DENX Software Engineering GmbH, Managing Director: Wolfgang Denk
HRB 165235 Munich, Office: Kirchenstr.5, D-82194 Groebenzell, Germany

Join {cip-dev@lists.cip-project.org to automatically receive all group messages.