In the Linux kernel, the following vulnerability has been resolved:
net/nfc/rawsock.c: fix a permission check bug The function rawsock_create()
calls a privileged function sk_alloc(), which requires a ns-aware check to
check net->user_ns, i.e., ns_capable(). However, the original code checks
the init_user_ns using capable(). So we replace the capable() with
ns_capable().
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 23.10 | noarch | linux | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 14.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 16.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < any | UNKNOWN |
git.kernel.org/linus/8ab78863e9eff11910e1ac8bcf478060c29b379e (5.13-rc4)
git.kernel.org/stable/c/1e5cab50208c8fb7351b798cb1d569debfeb994a
git.kernel.org/stable/c/38cb2e23188af29c43966acee9dbb18b62e26cfe
git.kernel.org/stable/c/8ab78863e9eff11910e1ac8bcf478060c29b379e
git.kernel.org/stable/c/90d0a3c76965d7a10fc87c07be3e9714e2130d5c
git.kernel.org/stable/c/c08e0be44759d0b5affc5888be4aa5e536873335
git.kernel.org/stable/c/d6a21a3fb03300fbaa9fc3ed99f8b0962ce28362
git.kernel.org/stable/c/ec72482564ff99c6832d33610d9f8ab7ecc81b6d
git.kernel.org/stable/c/f3ed12af6bbbaf79eddb0ae14656b8ecacea74f0
launchpad.net/bugs/cve/CVE-2021-47285
nvd.nist.gov/vuln/detail/CVE-2021-47285
security-tracker.debian.org/tracker/CVE-2021-47285
www.cve.org/CVERecord?id=CVE-2021-47285