CVE-2021-38208
Summary
| CVE | CVE-2021-38208 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2021-08-08 20:15:00 UTC |
| Updated | 2021-09-21 18:23:00 UTC |
| Description | net/nfc/llcp_sock.c in the Linux kernel before 5.12.10 allows local unprivileged users to cause a denial of service (NULL pointer dereference and BUG) by making a getsockname call after a certain type of failure of a bind call. |
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|
| Operating System |
Linux |
Linux Kernel |
All |
All |
All |
All |
References
| Reference | Source | Link | Tags |
|---|
| 1992810 – (CVE-2021-38208) CVE-2021-38208 kernel: NULL pointer dereference in net/nfc/llcp_sock.c by making a getsockname call after a certain type of failure of a bind call |
CONFIRM |
bugzilla.redhat.com |
|
| cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.10 |
MISC |
cdn.kernel.org |
|
| nfc: fix NULL ptr dereference in llcp_sock_getname() after failed con… · torvalds/linux@4ac06a1 · GitHub |
MISC |
github.com |
|
| oss-security - Re: Linux kernel: nfc: null ptr dereference in
llcp_sock_getname |
MLIST |
www.openwall.com |
|
| oss-security - Re: Linux kernel: nfc: null ptr dereference in llcp_sock_getname |
MLIST |
www.openwall.com |
|
| oss-security - Re: Linux kernel: nfc: null ptr dereference in llcp_sock_getname |
MLIST |
www.openwall.com |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 179869 Debian Security Update for linux (CVE-2021-38208)
- 198468 Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-5050-1)
- 353147 Amazon Linux Security Advisory for kernel : ALAS2KERNEL-5.4-2022-004
- 353158 Amazon Linux Security Advisory for kernel : ALAS2KERNEL-5.10-2022-002
- 671051 EulerOS Security Update for kernel (EulerOS-SA-2021-2663)
- 671134 EulerOS Security Update for kernel (EulerOS-SA-2021-2688)
- 671137 EulerOS Security Update for kernel (EulerOS-SA-2021-2713)
- 752120 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:1651-1)
- 752125 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:1686-1)
- 752126 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:1687-1)
- 752231 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:2082-1)
- 752237 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:2083-1)
- 752240 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:2103-1)
- 752250 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:2111-1)
- 753176 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:1676-1)
- 753299 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:1669-1)
- 900294 CBL-Mariner Linux Security Update for kernel 5.10.52.1
- 900304 CBL-Mariner Linux Security Update for kernel 5.10.57.1
- 900319 CBL-Mariner Linux Security Update for kernel 5.10.60.1
- 901779 Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (6592-1)
- 903572 Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (5083)
- 905782 Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (5083-1)