Lucene search

K
archlinuxArchLinuxASA-202102-23
HistoryFeb 12, 2021 - 12:00 a.m.

[ASA-202102-23] linux: arbitrary code execution

2021-02-1200:00:00
security.archlinux.org
314

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

9.3%

Arch Linux Security Advisory ASA-202102-23

Severity: Medium
Date : 2021-02-12
CVE-ID : CVE-2021-3347
Package : linux
Type : arbitrary code execution
Remote : No
Link : https://security.archlinux.org/AVG-1506

Summary

The package linux before version 5.10.12.arch1-1 is vulnerable to
arbitrary code execution.

Resolution

Upgrade to 5.10.12.arch1-1.

pacman -Syu “linux>=5.10.12.arch1-1”

The problem has been fixed upstream in version 5.10.12.arch1.

Workaround

None.

Description

An issue was discovered in the Linux kernel through 5.10.11. PI futexes
have a kernel stack use-after-free during fault handling, allowing
local users to execute code in the kernel, aka CID-34b1a1ce1458.

Impact

An attacker can escalate privileges on the system by abusing io_uring
descriptor initialization.

References

https://www.openwall.com/lists/oss-security/2021/01/29/1
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=12bb3f7f1b03d5913b3f9d4236a488aa7774dfe9
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=04b79c55201f02ffd675e1231d731365e335c307
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c5cade200ab9a2a3be9e7f32a752c8d86b502ec7
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2156ac1934166d6deb6cd0f6ffc4c1076ec63697
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6ccc84f917d33312eb2846bd7b567639f585ad6d
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f2dac39d93987f7de1e20b3988c8685523247ae2
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=34b1a1ce1458f50ef27c54e28eb9b1947012907a
https://security.archlinux.org/CVE-2021-3347

OSVersionArchitecturePackageVersionFilename
ArchLinuxanyanylinux< 5.10.12.arch1-1UNKNOWN

References

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

9.3%