Description


A flaw use-after-free in function sco_sock_sendmsg() of the Linux kernel HCI subsystem was found in the way user calls ioct UFFDIO_REGISTER or other way triggers race condition of the call sco_conn_del() together with the call sco_sock_sendmsg() with the expected controllable faulting memory page. A privileged local user could use this flaw to crash the system or escalate their privileges on the system.

References


https://bugzilla.redhat.com/show_bug.cgi?id=1980646

Issue TrackingPatchThird Party Advisory








https://www.openwall.com/lists/oss-security/2021/07/22/1

ExploitMailing ListThird Party Advisory

https://bugzilla.redhat.com/show_bug.cgi?id=1980646

Issue TrackingPatchThird Party Advisory








https://www.openwall.com/lists/oss-security/2021/07/22/1

ExploitMailing ListThird Party Advisory

Weaknesses



CWE-362


CWE-416

CVSS impact metrics


CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

7 · High

Information


Source identifier

[email protected]

Vulnerability status

Modified

Published

2022-03-03T22:15:08.197Z

4 years ago

Last modified

2024-11-21T05:22:03.073Z

1 year ago