Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-3609

Опубликовано: 19 июн. 2021
Источник: redhat
CVSS3: 7
EPSS Низкий

Описание

.A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.

A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges.

Отчет

Red Hat Product Security is aware of this issue. Updates will be released as they become available. For Red Hat Virtualization, this flaw is rated Moderate as CAN is not used on host nodes.

Меры по смягчению последствий

As the CAN module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:

echo "install can-bcm /bin/true" >> /etc/modprobe.d/disable-can-bcm.conf

The system will need to be restarted if the CAN modules are loaded. In most circumstances, the CAN kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use. If the system requires this module to work correctly, this mitigation may not be suitable. If you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6kernelOut of support scope
Red Hat Enterprise Linux 7kernelOut of support scope
Red Hat Enterprise Linux 7kernel-rtOut of support scope
Red Hat Enterprise Linux 9kernelNot affected
Red Hat Enterprise Linux 8kernel-rtFixedRHSA-2021:308810.08.2021
Red Hat Enterprise Linux 8kpatch-patchFixedRHSA-2021:304410.08.2021
Red Hat Enterprise Linux 8kernelFixedRHSA-2021:305710.08.2021
Red Hat Enterprise Linux 8.1 Extended Update Supportkpatch-patchFixedRHSA-2021:344207.09.2021
Red Hat Enterprise Linux 8.1 Extended Update SupportkernelFixedRHSA-2021:344407.09.2021
Red Hat Enterprise Linux 8.2 Extended Update Supportkernel-rtFixedRHSA-2021:337531.08.2021

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-362
https://bugzilla.redhat.com/show_bug.cgi?id=1971651kernel: race condition in net/can/bcm.c leads to local privilege escalation

EPSS

Процентиль: 17%
0.00055
Низкий

7 High

CVSS3

Связанные уязвимости

CVSS3: 7
ubuntu
больше 3 лет назад

.A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.

CVSS3: 7
nvd
больше 3 лет назад

.A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.

CVSS3: 7
msrc
больше 3 лет назад

Описание отсутствует

CVSS3: 7
debian
больше 3 лет назад

.A flaw was found in the CAN BCM networking protocol in the Linux kern ...

CVSS3: 7
github
больше 3 лет назад

.A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.

EPSS

Процентиль: 17%
0.00055
Низкий

7 High

CVSS3