Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-0920

Опубликовано: 28 июл. 2021
Источник: redhat
CVSS3: 7.4

Описание

In unix_scm_to_skb of af_unix.c, there is a possible use after free bug due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-196926917References: Upstream kernel

A vulnerability was found in unix_dgram_recvmsg in net/unix/af_unix.c in the Linux kernel's garbage collection for Unix domain socket file handlers. In this flaw, a missing cleanup may lead to a use-after-free due to a race problem. This flaw allows a local user to crash the system or escalate their privileges on the system. A read-after-free memory flaw was found in the Linux kernel's garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 9kernelNot affected
Red Hat Enterprise Linux 6 Extended Lifecycle SupportkernelFixedRHSA-2022:141719.04.2022
Red Hat Enterprise Linux 7kernel-rtFixedRHSA-2022:062222.02.2022
Red Hat Enterprise Linux 7kpatch-patchFixedRHSA-2022:059222.02.2022
Red Hat Enterprise Linux 7kernelFixedRHSA-2022:062022.02.2022
Red Hat Enterprise Linux 7.3 Advanced Update SupportkernelFixedRHSA-2022:110629.03.2022
Red Hat Enterprise Linux 7.4 Advanced Update SupportkernelFixedRHSA-2022:110429.03.2022
Red Hat Enterprise Linux 7.6 Advanced Update Support(Disable again in 2026 - SPRHEL-7118)kernelFixedRHSA-2022:110729.03.2022
Red Hat Enterprise Linux 7.6 Telco Extended Update SupportkernelFixedRHSA-2022:110729.03.2022
Red Hat Enterprise Linux 7.6 Update Services for SAP Solutionskpatch-patchFixedRHSA-2022:110329.03.2022

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-416
https://bugzilla.redhat.com/show_bug.cgi?id=2031930kernel: Use After Free in unix_gc() which could result in a local privilege escalation

7.4 High

CVSS3

Связанные уязвимости

CVSS3: 6.4
ubuntu
больше 3 лет назад

In unix_scm_to_skb of af_unix.c, there is a possible use after free bug due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-196926917References: Upstream kernel

CVSS3: 6.4
nvd
больше 3 лет назад

In unix_scm_to_skb of af_unix.c, there is a possible use after free bug due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-196926917References: Upstream kernel

CVSS3: 6.4
debian
больше 3 лет назад

In unix_scm_to_skb of af_unix.c, there is a possible use after free bu ...

suse-cvrf
около 3 лет назад

Security update for the Linux Kernel (Live Patch 25 for SLE 15 SP2)

suse-cvrf
больше 3 лет назад

Security update for the Linux Kernel (Live Patch 38 for SLE 12 SP3)

7.4 High

CVSS3