Description
Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability.
No analysis available yet.
Remediation
Vendor Solution
Apply the following patch: https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=c61760e6940d
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2689-1 | linux security update |
Debian DLA |
DLA-2690-1 | linux-4.19 security update |
EUVD |
EUVD-2021-10252 | Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability. |
Ubuntu USN |
USN-4997-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-4997-2 | Linux kernel (KVM) vulnerabilities |
Ubuntu USN |
USN-5000-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5000-2 | Linux kernel (KVM) vulnerabilities |
Ubuntu USN |
USN-5001-1 | Linux kernel (OEM) vulnerabilities |
Ubuntu USN |
USN-5016-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5018-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5343-1 | Linux kernel vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: palo_alto
Published:
Updated: 2024-09-17T03:38:10.572Z
Reserved: 2021-01-06T00:00:00.000Z
Link: CVE-2021-23134
No data.
Status : Modified
Published: 2021-05-12T23:15:07.707
Modified: 2024-11-21T05:51:16.257
Link: CVE-2021-23134
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
EUVD
Ubuntu USN