Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-41073

Опубликовано: 19 сент. 2021
Источник: debian
EPSS Низкий

Описание

loop_rw_iter in fs/io_uring.c in the Linux kernel 5.10 through 5.14.6 allows local users to gain privileges by using IORING_OP_PROVIDE_BUFFERS to trigger a free of a kernel buffer, as demonstrated by using /proc/<pid>/maps for exploitation.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed5.14.6-2package
linuxnot-affectedbusterpackage
linuxnot-affectedstretchpackage

Примечания

  • https://www.openwall.com/lists/oss-security/2021/09/18/2

  • https://www.graplsecurity.com/post/iou-ring-exploiting-the-linux-kernel

  • https://starlabs.sg/blog/2022/06/io_uring-new-code-new-bugs-and-a-new-exploit-technique/

EPSS

Процентиль: 75%
0.00896
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 4 года назад

loop_rw_iter in fs/io_uring.c in the Linux kernel 5.10 through 5.14.6 allows local users to gain privileges by using IORING_OP_PROVIDE_BUFFERS to trigger a free of a kernel buffer, as demonstrated by using /proc/<pid>/maps for exploitation.

CVSS3: 7.8
redhat
почти 4 года назад

loop_rw_iter in fs/io_uring.c in the Linux kernel 5.10 through 5.14.6 allows local users to gain privileges by using IORING_OP_PROVIDE_BUFFERS to trigger a free of a kernel buffer, as demonstrated by using /proc/<pid>/maps for exploitation.

CVSS3: 7.8
nvd
почти 4 года назад

loop_rw_iter in fs/io_uring.c in the Linux kernel 5.10 through 5.14.6 allows local users to gain privileges by using IORING_OP_PROVIDE_BUFFERS to trigger a free of a kernel buffer, as demonstrated by using /proc/<pid>/maps for exploitation.

CVSS3: 7.8
msrc
больше 3 лет назад

Описание отсутствует

CVSS3: 7.8
github
около 3 лет назад

loop_rw_iter in fs/io_uring.c in the Linux kernel through 5.14.6 allows local users to gain privileges by using IORING_OP_PROVIDE_BUFFERS to trigger a free of a kernel buffer, as demonstrated by using /proc/<pid>/maps for exploitation.

EPSS

Процентиль: 75%
0.00896
Низкий