#VU52036 Improper Privilege Management in Linux kernel - CVE-2021-26708
Published: April 12, 2021 / Updated: December 3, 2023
Vulnerability identifier: #VU52036
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A/U:Clear
CVE-ID: CVE-2021-26708
CWE-ID: CWE-269
Exploitation vector: Local access
Exploit availability:
The vulnerability is being exploited in the wild
Vulnerable software:
Linux kernel
Linux kernel
Software vendor:
Linux Foundation
Linux Foundation
Description
The vulnerability allows a local user to escalate privileges.
The vulnerability exists due to improper privilege management. Multiple race conditions in the AF_VSOCK implementation are caused by wrong locking in net/vmw_vsock/af_vsock.c. The race conditions were implicitly introduced in the commits that added VSOCK multi-transport support.
Remediation
Install updates from vendor's website.
External links
- http://www.openwall.com/lists/oss-security/2021/02/05/6
- http://www.openwall.com/lists/oss-security/2021/04/09/2
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.13
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c518adafa39f37858697ac9309c6cf1805581446
- https://security.netapp.com/advisory/ntap-20210312-0008/
- https://www.openwall.com/lists/oss-security/2021/02/04/5