CVE-2021-3640

Name
CVE-2021-3640
Description
A flaw use-after-free in function sco_sock_sendmsg() of the Linux kernel HCI subsystem was found in the way user calls ioct UFFDIO_REGISTER or other way triggers race condition of the call sco_conn_del() together with the call sco_sock_sendmsg() with the expected controllable faulting memory page. A privileged local user could use this flaw to crash the system or escalate their privileges on the system.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Patch https://github.com/torvalds/linux/commit/99c23da0eed4fd20cae8243f2b51e10e66aa0951
Issue Tracking https://bugzilla.redhat.com/show_bug.cgi?id=1980646
Patch https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/bluetooth/sco.c?h=v5.16&id=99c23da0eed4fd20cae8243f2b51e10e66aa0951
Exploit https://www.openwall.com/lists/oss-security/2021/07/22/1
Patch https://ubuntu.com/security/CVE-2021-3640
Mailing List https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
Mailing List https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
Third Party Advisory https://www.debian.org/security/2022/dsa-5096
CONFIRM https://security.netapp.com/advisory/ntap-20220419-0003/

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:linux:linux_kernel:*:*:*:*:*:*:*:* linux_kernel >= None < 5.15.3

Vulnerable and fixed packages

Source package Branch Version Maintainer Status