Lucene search

K
f5F5F5:K25511825
HistoryApr 19, 2022 - 12:00 a.m.

K25511825 : Linux kernel vulnerabilities CVE-2021-3564, CVE-2021-3573, and CVE-2021-3752

2022-04-1900:00:00
my.f5.com
47
linux kernel
vulnerabilities
hci device initialization
double-free memory corruption
use-after-free
bluetooth subsystem

AI Score

6.7

Confidence

High

EPSS

0.001

Percentile

46.5%

Security Advisory Description

A flaw double-free memory corruption in the Linux kernel HCI device initialization subsystem was found in the way user attach malicious HCI TTY Bluetooth device. A local user could use this flaw to crash the system. This flaw affects all the Linux kernel versions starting from 3.13.

A use-after-free in function hci_sock_bound_ioctl() of the Linux kernel HCI subsystem was found in the way user calls ioct HCIUNBLOCKADDR or other way triggers race condition of the call hci_unregister_dev() together with one of the calls hci_sock_blacklist_add(), hci_sock_blacklist_del(), hci_get_conn_info(), hci_get_auth_info(). A privileged local user could use this flaw to crash the system or escalate their privileges on the system. This flaw affects the Linux kernel versions prior to 5.13-rc5.

A use-after-free flaw was found in the Linux kernel’s Bluetooth subsystem in the way user calls connect to the socket and disconnect simultaneously due to a race condition. This flaw allows a user to crash the system or escalate their privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.

Impact

There is no impact; F5 products are not affected by this vulnerability.