Описание
.A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.
A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges.
Отчет
Red Hat Product Security is aware of this issue. Updates will be released as they become available. For Red Hat Virtualization, this flaw is rated Moderate as CAN is not used on host nodes.
Меры по смягчению последствий
As the CAN module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:
echo "install can-bcm /bin/true" >> /etc/modprobe.d/disable-can-bcm.conf
The system will need to be restarted if the CAN modules are loaded. In most circumstances, the CAN kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use. If the system requires this module to work correctly, this mitigation may not be suitable. If you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 6 | kernel | Out of support scope | ||
Red Hat Enterprise Linux 7 | kernel | Out of support scope | ||
Red Hat Enterprise Linux 7 | kernel-rt | Out of support scope | ||
Red Hat Enterprise Linux 9 | kernel | Not affected | ||
Red Hat Enterprise Linux 8 | kernel-rt | Fixed | RHSA-2021:3088 | 10.08.2021 |
Red Hat Enterprise Linux 8 | kpatch-patch | Fixed | RHSA-2021:3044 | 10.08.2021 |
Red Hat Enterprise Linux 8 | kernel | Fixed | RHSA-2021:3057 | 10.08.2021 |
Red Hat Enterprise Linux 8.1 Extended Update Support | kpatch-patch | Fixed | RHSA-2021:3442 | 07.09.2021 |
Red Hat Enterprise Linux 8.1 Extended Update Support | kernel | Fixed | RHSA-2021:3444 | 07.09.2021 |
Red Hat Enterprise Linux 8.2 Extended Update Support | kernel-rt | Fixed | RHSA-2021:3375 | 31.08.2021 |
Показывать по
Дополнительная информация
Статус:
EPSS
7 High
CVSS3
Связанные уязвимости
.A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.
.A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.
.A flaw was found in the CAN BCM networking protocol in the Linux kern ...
.A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.
EPSS
7 High
CVSS3