7
CVSSv3

CVE-2021-3609

Published: 03/03/2022 Updated: 11/08/2023
CVSS v2 Base Score: 6.9 | Impact Score: 10 | Exploitability Score: 3.4
CVSS v3 Base Score: 7 | Impact Score: 5.9 | Exploitability Score: 1
VMScore: 615
Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

It exists that the NFC subsystem in the Linux kernel contained a use-after-free vulnerability in its NFC Controller Interface (NCI) implementation. A local attacker could possibly use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2021-3760) ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

redhat virtualization host 4.0

redhat virtualization 4.0

redhat enterprise linux eus 8.1

redhat enterprise linux eus 8.2

redhat enterprise linux server tus 8.2

redhat enterprise linux server aus 8.2

redhat enterprise linux aus 8.2

redhat openshift container platform 4.6

redhat 3scale api management 2.0

redhat openshift container platform 4.7

redhat enterprise linux server tus 8.4

redhat enterprise linux eus 8.4

redhat enterprise linux for real time for nfv tus 8.2

redhat enterprise linux for real time tus 8.2

redhat enterprise linux server aus 8.4

redhat enterprise linux server update services for sap solutions 8.2

redhat enterprise linux server update services for sap solutions 8.4

redhat enterprise linux server update services for sap solutions 8.1

redhat enterprise linux for power little endian eus 8.2

redhat enterprise linux for power little endian eus 8.1

redhat enterprise linux for ibm z systems eus 8.4

redhat enterprise linux for power little endian eus 8.4

redhat openshift container platform 4.8

redhat enterprise linux server for power little endian update services for sap solutions 8.1

redhat enterprise linux server for power little endian update services for sap solutions 8.2

redhat enterprise linux server for power little endian update services for sap solutions 8.4

redhat enterprise linux for ibm z systems eus s390x 8.1

redhat enterprise linux for real time 8.0

redhat build of quarkus 1.0

redhat enterprise linux for real time for nfv 8.0

redhat enterprise linux for real time tus 8.0

redhat enterprise linux for real time for nfv tus 8.0

redhat codeready linux builder eus 8.1

redhat codeready linux builder eus 8.2

redhat codeready linux builder eus 8.4

redhat codeready linux builder for power little endian eus 8.1

redhat codeready linux builder for power little endian eus 8.2

redhat codeready linux builder for power little endian eus 8.4

netapp h300s_firmware -

netapp h500s_firmware -

netapp h700s_firmware -

netapp h300e_firmware -

netapp h500e_firmware -

netapp h700e_firmware -

netapp h410s_firmware -

netapp h410c_firmware -

netapp h610c_firmware -

netapp h610s_firmware -

netapp h615c_firmware -

Vendor Advisories

Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks CVE-2020-36311 A flaw was discovered in the KVM subsystem for AMD CPUs, allowing an attacker to cause a denial of service by triggering destruction of a large SEV VM CVE-2021-3609 Norber ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
A flaw was found in the Linux kernel When reusing a socket with an attached dccps_hc_tx_ccid as a listener, the socket will be used after being released leading to denial of service (DoS) or a potential code execution The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability (CVE-2020-1611 ...
A flaw was found in the Linux kernel A race condition occurs between bcm_release() and bcm_rx_handler() leading to various use-after-free's in bcm_rx_handler() and, depending on the provided flags, also in bcm_rx_timeout_handler() The use-after-free's in combination with a heap spray may lead to sensitive socket data being overwritten, resulting ...
A race condition in net/can/bcmc in the Linux kernel allows for local privilege escalation to root The CAN BCM networking protocol allows to register a CAN message receiver for a specified socket The function bcm_rx_handler() is run for incoming CAN messages Simultaneously to running this function, the socket can be closed and bcm_release() wil ...

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> Re: CVE-2021-3609: Race condition in net/can/bcmc leads to local privilege escalation <!--X-Subject-Header-End--> <!--X-Head- ...
<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> CVE-2021-3609: Race condition in net/can/bcmc leads to local privilege escalation <!--X-Subject-Header-End--> <!--X-Head-of-M ...