2021-01-29 17:00:44 +00:00
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org" ,
"ID" : "CVE-2021-3347" ,
"STATE" : "PUBLIC"
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a" ,
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
} ,
"vendor_name" : "n/a"
}
]
}
} ,
"data_format" : "MITRE" ,
"data_type" : "CVE" ,
"data_version" : "4.0" ,
"description" : {
"description_data" : [
{
"lang" : "eng" ,
2021-01-29 18:00:41 +00:00
"value" : "An issue was discovered in the Linux kernel through 5.10.11. PI futexes have a kernel stack use-after-free during fault handling, allowing local users to execute code in the kernel, aka CID-34b1a1ce1458."
2021-01-29 17:00:44 +00:00
}
]
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "n/a"
}
]
}
]
} ,
"references" : {
"reference_data" : [
{
"url" : "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c64396cc36c6e60704ab06c1fb1c4a46179c9120" ,
"refsource" : "MISC" ,
"name" : "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c64396cc36c6e60704ab06c1fb1c4a46179c9120"
} ,
{
"url" : "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=34b1a1ce1458f50ef27c54e28eb9b1947012907a" ,
"refsource" : "MISC" ,
"name" : "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=34b1a1ce1458f50ef27c54e28eb9b1947012907a"
} ,
{
"url" : "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f2dac39d93987f7de1e20b3988c8685523247ae2" ,
"refsource" : "MISC" ,
"name" : "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f2dac39d93987f7de1e20b3988c8685523247ae2"
} ,
{
"url" : "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6ccc84f917d33312eb2846bd7b567639f585ad6d" ,
"refsource" : "MISC" ,
"name" : "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6ccc84f917d33312eb2846bd7b567639f585ad6d"
} ,
{
"url" : "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2156ac1934166d6deb6cd0f6ffc4c1076ec63697" ,
"refsource" : "MISC" ,
"name" : "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2156ac1934166d6deb6cd0f6ffc4c1076ec63697"
} ,
{
"url" : "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c5cade200ab9a2a3be9e7f32a752c8d86b502ec7" ,
"refsource" : "MISC" ,
"name" : "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c5cade200ab9a2a3be9e7f32a752c8d86b502ec7"
} ,
{
"url" : "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=04b79c55201f02ffd675e1231d731365e335c307" ,
"refsource" : "MISC" ,
"name" : "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=04b79c55201f02ffd675e1231d731365e335c307"
} ,
{
"url" : "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=12bb3f7f1b03d5913b3f9d4236a488aa7774dfe9" ,
"refsource" : "MISC" ,
"name" : "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=12bb3f7f1b03d5913b3f9d4236a488aa7774dfe9"
2021-01-29 18:00:41 +00:00
} ,
{
"refsource" : "MISC" ,
"name" : "https://www.openwall.com/lists/oss-security/2021/01/29/3" ,
"url" : "https://www.openwall.com/lists/oss-security/2021/01/29/3"
} ,
{
"refsource" : "MISC" ,
"name" : "https://www.openwall.com/lists/oss-security/2021/01/29/1" ,
"url" : "https://www.openwall.com/lists/oss-security/2021/01/29/1"
2021-01-29 19:00:41 +00:00
} ,
{
"refsource" : "MLIST" ,
"name" : "[oss-security] 20210129 Re: Linux Kernel: local priv escalation via futexes" ,
"url" : "http://www.openwall.com/lists/oss-security/2021/01/29/5"
} ,
{
"refsource" : "MLIST" ,
"name" : "[oss-security] 20210129 Re: Linux Kernel: local priv escalation via futexes" ,
"url" : "http://www.openwall.com/lists/oss-security/2021/01/29/4"
2021-02-01 22:00:39 +00:00
} ,
{
"refsource" : "MLIST" ,
"name" : "[oss-security] 20210201 Re: Linux Kernel: local priv escalation via futexes" ,
"url" : "http://www.openwall.com/lists/oss-security/2021/02/01/4"
2021-02-02 12:00:41 +00:00
} ,
{
"refsource" : "DEBIAN" ,
"name" : "DSA-4843" ,
"url" : "https://www.debian.org/security/2021/dsa-4843"
2021-02-05 14:01:01 +00:00
} ,
{
"refsource" : "FEDORA" ,
"name" : "FEDORA-2021-6e805a5051" ,
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CXAVDAK4RLAHBHHGEPL73UFXSI6BXQ7Q/"
} ,
{
"refsource" : "FEDORA" ,
"name" : "FEDORA-2021-879c756377" ,
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QOBMXDJABYE76RKNBAWA2E4TSSBX7CSJ/"
2021-02-12 22:00:40 +00:00
} ,
{
"refsource" : "MLIST" ,
"name" : "[debian-lts-announce] 20210212 [SECURITY] [DLA 2557-1] linux-4.19 security update" ,
"url" : "https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html"
2021-03-04 13:00:48 +00:00
} ,
{
"refsource" : "CONFIRM" ,
"name" : "https://security.netapp.com/advisory/ntap-20210304-0005/" ,
"url" : "https://security.netapp.com/advisory/ntap-20210304-0005/"
2021-03-09 21:00:54 +00:00
} ,
{
"refsource" : "MLIST" ,
"name" : "[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update" ,
"url" : "https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html"
2021-01-29 17:00:44 +00:00
}
]
}
}