CVE-2021-3609 log
Source |
|
Severity | Medium |
Remote | No |
Type | Privilege escalation |
Description | A race condition in net/can/bcm.c in the Linux kernel before version 5.13.2 allows for local privilege escalation to root. The CAN BCM networking protocol allows to register a CAN message receiver for a specified socket. The function bcm_rx_handler() is run for incoming CAN messages. Simultaneously to running this function, the socket can be closed and bcm_release() will be called. Inside bcm_release(), struct bcm_op and struct bcm_sock are freed while bcm_rx_handler() is still running, finally leading to multiple use-after-free's. |
Group | Package | Affected | Fixed | Severity | Status | Ticket |
---|---|---|---|---|---|---|
AVG-2184 | linux-lts | 5.10.51-1 | 5.10.52-1 | High | Fixed | |
AVG-2183 | linux-hardened | 5.12.18.hardened1-1 | 5.12.19.hardened1-1 | High | Fixed | |
AVG-2182 | linux-zen | 5.13.1.zen1-1 | 5.13.4.zen1-1 | High | Fixed | |
AVG-2181 | linux | 5.13.1.arch1-1 | 5.13.4.arch1-1 | High | Fixed |
Date | Advisory | Group | Package | Severity | Type |
---|---|---|---|---|---|
21 Jul 2021 | ASA-202107-51 | AVG-2184 | linux-lts | High | privilege escalation |
21 Jul 2021 | ASA-202107-50 | AVG-2183 | linux-hardened | High | privilege escalation |
21 Jul 2021 | ASA-202107-49 | AVG-2182 | linux-zen | High | privilege escalation |
21 Jul 2021 | ASA-202107-48 | AVG-2181 | linux | High | privilege escalation |