nbd_add_socket in drivers/block/nbd.c in the Linux kernel through 5.10.12 has an ndb_queue_rq use-after-free that could be triggered by local attackers (with access to the nbd device) via an I/O request at a certain point during device setup, aka CID-b98e762e3d71.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2021/02/01/1 | Mailing List Patch Third Party Advisory |
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b98e762e3d71e893b221f871825dc64694cfb258 | Mailing List Patch Vendor Advisory |
https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html | Third Party Advisory |
https://www.openwall.com/lists/oss-security/2021/01/28/3 | Mailing List Patch Third Party Advisory |
Configurations
History
No history.
Information
Published : 2021-02-01 04:15
Updated : 2022-04-26 16:17
NVD link : CVE-2021-3348
Mitre link : CVE-2021-3348
CVE.ORG link : CVE-2021-3348
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel