CVE-2021-3491 - log back

CVE-2021-3491 edited at 14 May 2021 22:08:16
References
https://www.openwall.com/lists/oss-security/2021/05/11/13
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=v5.12.4&id=ca2960d35c36f2e601563c49f6673efd111b94c0
+ https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=v5.11.21&id=7a8411015f744e68013d77432d869be5ad34208f
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=v5.10.37&id=7e916d0124e5f40d7912f93a633f5dee2c3ad735
CVE-2021-3491 edited at 14 May 2021 15:47:30
Description
- A security issue was found in the Linux kernel. It was discovered that the io_uring PROVIDE_BUFFERS operation allowed the MAX_RW_COUNT limit to be bypassed, which led to negative values being used in mem_rw when reading /proc/<PID>/mem, resulting in a heap overflow.
+ A security issue was found in the Linux kernel before version 5.12.4. It was discovered that the io_uring PROVIDE_BUFFERS operation allowed the MAX_RW_COUNT limit to be bypassed, which led to negative values being used in mem_rw when reading /proc/<PID>/mem, resulting in a heap overflow.
References
https://www.openwall.com/lists/oss-security/2021/05/11/13
- https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/fs/io_uring.c?h=v5.12.4&id=ca2960d35c36f2e601563c49f6673efd111b94c0
+ https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=v5.12.4&id=ca2960d35c36f2e601563c49f6673efd111b94c0
- https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/fs/io_uring.c?h=v5.10.37&id=7e916d0124e5f40d7912f93a633f5dee2c3ad735
+ https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=v5.10.37&id=7e916d0124e5f40d7912f93a633f5dee2c3ad735
CVE-2021-3491 edited at 14 May 2021 15:38:55
References
https://www.openwall.com/lists/oss-security/2021/05/11/13
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d1f82808877bb10d3deee7cf3374a4eb3fb582db
+ https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/fs/io_uring.c?h=v5.12.4&id=ca2960d35c36f2e601563c49f6673efd111b94c0
+ https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/fs/io_uring.c?h=v5.10.37&id=7e916d0124e5f40d7912f93a633f5dee2c3ad735
CVE-2021-3491 edited at 11 May 2021 18:37:27
Description
- A buffer overflow security issue was found in the Linux kernel when using IORING_OP_PROVIDE_BUFFERS.
+ A security issue was found in the Linux kernel. It was discovered that the io_uring PROVIDE_BUFFERS operation allowed the MAX_RW_COUNT limit to be bypassed, which led to negative values being used in mem_rw when reading /proc/<PID>/mem, resulting in a heap overflow.
References
+ https://www.openwall.com/lists/oss-security/2021/05/11/13
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d1f82808877bb10d3deee7cf3374a4eb3fb582db
CVE-2021-3491 edited at 08 May 2021 17:04:36
Severity
- Unknown
+ Medium
Remote
- Unknown
+ Local
Type
- Unknown
+ Arbitrary code execution
Description
+ A buffer overflow security issue was found in the Linux kernel when using IORING_OP_PROVIDE_BUFFERS.
References
+ https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d1f82808877bb10d3deee7cf3374a4eb3fb582db
CVE-2021-3491 created at 08 May 2021 17:00:59
Severity
+ Unknown
Remote
+ Unknown
Type
+ Unknown
Description
References
Notes