6.9 Medium
CVSS2
Attack Vector
LOCAL
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:M/Au:N/C:C/I:C/A:C
7 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
0.0004 Low
EPSS
Percentile
5.1%
A flaw use-after-free in function sco_sock_sendmsg() of the Linux kernel
HCI subsystem was found in the way user calls ioct UFFDIO_REGISTER or other
way triggers race condition of the call sco_conn_del() together with the
call sco_sock_sendmsg() with the expected controllable faulting memory
page. A privileged local user could use this flaw to crash the system or
escalate their privileges on the system.
Author | Note |
---|---|
sbeattie | Possibly addressed by Desmond Cheong Zhi Xi’s patchset. may need additional prerequisite commits |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux | < 4.15.0-167.175 | UNKNOWN |
ubuntu | 20.04 | noarch | linux | < 5.4.0-97.110 | UNKNOWN |
ubuntu | 21.10 | noarch | linux | < 5.13.0-28.31 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | < 4.15.0-1119.127 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < 5.4.0-1064.67 | UNKNOWN |
ubuntu | 21.10 | noarch | linux-aws | < 5.13.0-1012.13 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws-5.11 | < 5.11.0-1028.31~20.04.1 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws-5.13 | < 5.13.0-1012.13~20.04.1 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws-5.4 | < 5.4.0-1064.67~18.04.1 | UNKNOWN |
ubuntu | 16.04 | noarch | linux-aws-hwe | < 4.15.0-1119.126~16.04.2 | UNKNOWN |
git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=99c23da0eed4fd20cae8243f2b51e10e66aa0951
launchpad.net/bugs/cve/CVE-2021-3640
nvd.nist.gov/vuln/detail/CVE-2021-3640
security-tracker.debian.org/tracker/CVE-2021-3640
ubuntu.com/security/notices/USN-5265-1
ubuntu.com/security/notices/USN-5267-1
ubuntu.com/security/notices/USN-5267-3
ubuntu.com/security/notices/USN-5268-1
www.cve.org/CVERecord?id=CVE-2021-3640
www.openwall.com/lists/oss-security/2021/07/22/1
x-lore.kernel.org/all/[email protected]/
x-lore.kernel.org/all/[email protected]/
x-lore.kernel.org/all/[email protected]/
6.9 Medium
CVSS2
Attack Vector
LOCAL
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:M/Au:N/C:C/I:C/A:C
7 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
0.0004 Low
EPSS
Percentile
5.1%