A use-after-free flaw was found in nci_request in net/nfc/nci/core.c in NFC Controller Interface (NCI) in the Linux kernel. This flaw could allow a local attacker with user privileges to cause a data race problem while the device is getting removed, leading to a privilege escalation problem.
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.
Link | Tags |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=2036682 | patch third party advisory issue tracking |
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=3e3b5dfcd16a3e254aab61bd1e8c417dd4503102 | patch vendor advisory exploit |
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=48b71a9e66c2eab60564b1b1c85f4928ed04e406 | patch vendor advisory exploit |
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=86cdf8e38792545161dbe3350a7eced558ba4d15 | patch vendor advisory exploit |
https://security.netapp.com/advisory/ntap-20220513-0002/ | third party advisory |
http://www.openwall.com/lists/oss-security/2022/06/01/2 | third party advisory mailing list |
http://www.openwall.com/lists/oss-security/2022/06/04/2 | third party advisory mailing list |
http://www.openwall.com/lists/oss-security/2022/06/07/2 | third party advisory mailing list |