Vulnerability Name: | CVE-2021-26708 (CCN-196316) | ||||||||||||||||||||
Assigned: | 2021-02-05 | ||||||||||||||||||||
Published: | 2021-02-05 | ||||||||||||||||||||
Updated: | 2022-06-28 | ||||||||||||||||||||
Summary: | A local privilege escalation was discovered in the Linux kernel before 5.10.13. Multiple race conditions in the AF_VSOCK implementation are caused by wrong locking in net/vmw_vsock/af_vsock.c. The race conditions were implicitly introduced in the commits that added VSOCK multi-transport support. | ||||||||||||||||||||
CVSS v3 Severity: | 7.0 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) 6.1 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
6.8 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
6.8 Medium (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||||||||||
CVSS v2 Severity: | 6.9 Medium (CVSS v2 Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C)
| ||||||||||||||||||||
Vulnerability Type: | CWE-667 CWE-362 | ||||||||||||||||||||
Vulnerability Consequences: | Gain Privileges | ||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2021-26708 Source: MLIST Type: Mailing List, Patch, Third Party Advisory [oss-security] 20210205 Re: Linux kernel: Exploitable vulnerabilities in AF_VSOCK implementation Source: MLIST Type: Mailing List [oss-security] 20210409 Re: Linux kernel: Exploitable vulnerabilities in AF_VSOCK implementation Source: MLIST Type: Mailing List [oss-security] 20220125 CVE-2022-0185: Linux kernel slab out-of-bounds write: exploit and writeup Source: MISC Type: Release Notes, Vendor Advisory https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.13 Source: XF Type: UNKNOWN linux-kernel-cve202126708-priv-esc(196316) Source: CCN Type: Linux Kernel GIT Repository vsock: fix the race conditions in multi-transport support Source: MISC Type: Patch, Vendor Advisory https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c518adafa39f37858697ac9309c6cf1805581446 Source: CCN Type: oss-sec Mailing List, Fri, 05 Feb 2021 18:33:26 +0300 Re: Linux kernel: Exploitable vulnerabilities in AF_VSOCK implementation Source: CONFIRM Type: Patch, Third Party Advisory https://security.netapp.com/advisory/ntap-20210312-0008/ Source: MISC Type: Mailing List, Patch, Third Party Advisory https://www.openwall.com/lists/oss-security/2021/02/04/5 | ||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration 4: Configuration 5: Configuration RedHat 1: Configuration RedHat 2: Configuration RedHat 3: Configuration RedHat 4: Configuration RedHat 5: Configuration RedHat 6: Configuration CCN 1: ![]() | ||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||
| |||||||||||||||||||||
BACK |