[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CVE-2021-3347 log

Source
Severity Medium
Remote No
Type Arbitrary code execution
Description
An issue was discovered in the Linux kernel through 5.10.11. PI futexes have a kernel stack use-after-free during fault handling, allowing local users to execute code in the kernel, aka CID-34b1a1ce1458.
Group Package Affected Fixed Severity Status Ticket
AVG-1509 linux-lts 5.4.93-2 5.4.94-1 Medium Fixed
AVG-1508 linux-zen 5.10.11.zen2-1 5.10.12.zen1-1 Medium Fixed
AVG-1507 linux-hardened 5.10.11.hardened1-1 5.10.12.hardened1-1 Medium Fixed
AVG-1506 linux 5.10.11.arch1-1 5.10.12.arch1-1 Medium Fixed
Date Advisory Group Package Severity Type
12 Feb 2021 ASA-202102-23 AVG-1506 linux Medium arbitrary code execution
References
https://www.openwall.com/lists/oss-security/2021/01/29/1
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=12bb3f7f1b03d5913b3f9d4236a488aa7774dfe9
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=04b79c55201f02ffd675e1231d731365e335c307
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c5cade200ab9a2a3be9e7f32a752c8d86b502ec7
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2156ac1934166d6deb6cd0f6ffc4c1076ec63697
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6ccc84f917d33312eb2846bd7b567639f585ad6d
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f2dac39d93987f7de1e20b3988c8685523247ae2
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=34b1a1ce1458f50ef27c54e28eb9b1947012907a