.A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.
Link | Tags |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1971651 | issue tracking third party advisory |
https://www.openwall.com/lists/oss-security/2021/06/19/1 | third party advisory mailing list |
https://github.com/nrb547/kernel-exploitation/blob/main/cve-2021-3609/cve-2021-3609.md | exploit third party advisory technical description |
https://github.com/torvalds/linux/commit/d5f9023fa61ee8b94f37a93f08e94b136cf1e463 | third party advisory patch |
https://security.netapp.com/advisory/ntap-20220419-0004/ | third party advisory |