nbd_add_socket in drivers/block/nbd.c in the Linux kernel through 5.10.12 has an ndb_queue_rq use-after-free that could be triggered by local attackers (with access to the nbd device) via an I/O request at a certain point during device setup, aka CID-b98e762e3d71.
References
Link | Resource |
---|---|
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b98e762e3d71e893b221f871825dc64694cfb258 | Mailing List Patch Vendor Advisory |
https://www.openwall.com/lists/oss-security/2021/01/28/3 | Mailing List Patch Third Party Advisory |
http://www.openwall.com/lists/oss-security/2021/02/01/1 | Mailing List Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html | Third Party Advisory |
Information
Published : 2021-01-31 20:15
Updated : 2022-04-26 09:17
NVD link : CVE-2021-3348
Mitre link : CVE-2021-3348
JSON object : View
CWE
Products Affected
debian
- debian_linux
linux
- linux_kernel