nbd_add_socket in drivers/block/nbd.c in the Linux kernel through 5.10.12 has an ndb_queue_rq use-after-free that could be triggered by local attackers (with access to the nbd device) via an I/O request at a certain point during device setup, aka CID-b98e762e3d71.
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.
Link | Tags |
---|---|
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b98e762e3d71e893b221f871825dc64694cfb258 | mailing list patch vendor advisory |
https://www.openwall.com/lists/oss-security/2021/01/28/3 | mailing list third party advisory patch |
http://www.openwall.com/lists/oss-security/2021/02/01/1 | mailing list third party advisory patch |
https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html | third party advisory mailing list |