Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2689-1 | linux security update |
Debian DLA |
DLA-2690-1 | linux-4.19 security update |
EUVD |
EUVD-2021-10252 | Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability. |
Ubuntu USN |
USN-4997-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-4997-2 | Linux kernel (KVM) vulnerabilities |
Ubuntu USN |
USN-5000-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5000-2 | Linux kernel (KVM) vulnerabilities |
Ubuntu USN |
USN-5001-1 | Linux kernel (OEM) vulnerabilities |
Ubuntu USN |
USN-5016-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5018-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5343-1 | Linux kernel vulnerabilities |
Fixes
Solution
Apply the following patch: https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=c61760e6940d
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: palo_alto
Published:
Updated: 2024-09-17T03:38:10.572Z
Reserved: 2021-01-06T00:00:00
Link: CVE-2021-23134
No data.
Status : Modified
Published: 2021-05-12T23:15:07.707
Modified: 2024-11-21T05:51:16.257
Link: CVE-2021-23134
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN