net/nfc/llcp_sock.c in the Linux kernel before 5.12.10 allows local unprivileged users to cause a denial of service (NULL pointer dereference and BUG) by making a getsockname call after a certain type of failure of a bind call.
The product dereferences a pointer that it expects to be valid but is NULL.
Link | Tags |
---|---|
https://github.com/torvalds/linux/commit/4ac06a1e013cf5fdd963317ffd3b968560f33bba | patch third party advisory exploit |
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.10 | patch vendor advisory mailing list |
http://www.openwall.com/lists/oss-security/2021/08/17/1 | third party advisory mailing list |
http://www.openwall.com/lists/oss-security/2021/08/17/2 | third party advisory mailing list |
https://bugzilla.redhat.com/show_bug.cgi?id=1992810 | patch third party advisory issue tracking |
http://www.openwall.com/lists/oss-security/2021/08/24/2 | third party advisory mailing list |