Log

AVG-1509 created at 29 Jan 2021 20:19:25
Packages
+ linux-lts
Issues
+ CVE-2021-3347
Status
+ Vulnerable
Severity
+ Medium
Affected
+ 5.4.93-2
Fixed
Ticket
Advisory qualified
+ Yes
References
Notes
AVG-1508 created at 29 Jan 2021 20:19:10
Packages
+ linux-zen
Issues
+ CVE-2021-3347
Status
+ Vulnerable
Severity
+ Medium
Affected
+ 5.10.11.zen2-1
Fixed
Ticket
Advisory qualified
+ Yes
References
Notes
AVG-1507 created at 29 Jan 2021 20:18:56
Packages
+ linux-hardened
Issues
+ CVE-2021-3347
Status
+ Vulnerable
Severity
+ Medium
Affected
+ 5.10.11.hardened1-1
Fixed
Ticket
Advisory qualified
+ Yes
References
Notes
AVG-1506 edited at 29 Jan 2021 20:18:32
Severity
- Unknown
+ Medium
CVE-2021-3347 edited at 29 Jan 2021 20:18:32
Severity
- Unknown
+ Medium
Remote
- Unknown
+ Local
Type
- Unknown
+ Arbitrary code execution
Description
+ An issue was discovered in the Linux kernel through 5.10.11. PI futexes have a kernel stack use-after-free during fault handling, allowing local users to execute code in the kernel, aka CID-34b1a1ce1458.
References
+ https://www.openwall.com/lists/oss-security/2021/01/29/1
+ https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=12bb3f7f1b03d5913b3f9d4236a488aa7774dfe9
+ https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=04b79c55201f02ffd675e1231d731365e335c307
+ https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c5cade200ab9a2a3be9e7f32a752c8d86b502ec7
+ https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2156ac1934166d6deb6cd0f6ffc4c1076ec63697
+ https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6ccc84f917d33312eb2846bd7b567639f585ad6d
+ https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f2dac39d93987f7de1e20b3988c8685523247ae2
+ https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=34b1a1ce1458f50ef27c54e28eb9b1947012907a
Notes
AVG-1506 created at 29 Jan 2021 20:14:29
Packages
+ linux
Issues
+ CVE-2021-3347
Status
+ Vulnerable
Severity
+ Unknown
Affected
+ 5.10.11.arch1-1
Fixed
Ticket
Advisory qualified
+ Yes
References
Notes
CVE-2021-3347 created at 29 Jan 2021 20:14:29
ASA-202101-45 edited at 29 Jan 2021 19:33:02
ASA-202101-44 edited at 29 Jan 2021 19:32:40
Workaround
- The issue can be mitigated by disabling all custom integrations. This is achieved by renaming the custom_components folder inside the Home Assistant configuration folder to something else and restarting Home Assistant.
+ The issue can be mitigated by disabling all custom integrations. This
+ is achieved by renaming the custom_components folder inside the Home
+ Assistant configuration folder to something else and restarting Home
+ Assistant.
ASA-202101-43 edited at 29 Jan 2021 19:32:33
ASA-202101-42 edited at 29 Jan 2021 19:32:27
AVG-1482 edited at 29 Jan 2021 19:03:59
Status
- Testing
+ Fixed