Vulnerability Details : CVE-2021-32606
In the Linux kernel 5.11 through 5.12.2, isotp_setsockopt in net/can/isotp.c allows privilege escalation to root by leveraging a use-after-free. (This does not affect earlier versions that lack CAN ISOTP SF_BROADCAST support.)
Vulnerability category: Memory CorruptionGain privilege
Exploit prediction scoring system (EPSS) score for CVE-2021-32606
Probability of exploitation activity in the next 30 days: 0.05%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 12 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2021-32606
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
7.2
|
HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
3.9
|
10.0
|
[email protected] |
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
[email protected] |
CWE ids for CVE-2021-32606
-
Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.Assigned by: [email protected] (Primary)
References for CVE-2021-32606
-
http://www.openwall.com/lists/oss-security/2021/05/28/1
Mailing List;Patch;Third Party Advisory
-
https://lists.fedoraproject.org/archives/list/[email protected]/message/HD3NJBG25AADVGPRC63RX2JOQBMPSWK4/
Mailing List;Third Party Advisory
-
https://security.netapp.com/advisory/ntap-20210625-0001/
Third Party Advisory
-
https://www.openwall.com/lists/oss-security/2021/05/11/16
Mailing List;Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2021/05/12/1
Mailing List;Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2021/05/13/2
Mailing List;Third Party Advisory
-
https://lists.fedoraproject.org/archives/list/[email protected]/message/GI7Z7UBWBGD3ABNIL2DC7RQDCGA4UVQW/
Mailing List;Third Party Advisory
-
https://lists.fedoraproject.org/archives/list/[email protected]/message/73D53S4IZFPFQMRABMXXLW4AJK3EULDX/
Mailing List;Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2021/05/14/1
Mailing List;Third Party Advisory
Products affected by CVE-2021-32606
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*