7
CVE-2021-3609
- EPSS 0.06%
- Published 03.03.2022 19:15:08
- Last modified 21.11.2024 06:21:58
- Source secalert@redhat.com
- Teams watchlist Login
- Open Login
.A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.
Data is provided by the National Vulnerability Database (NVD)
Linux ≫ Linux Kernel Version >= 2.6.25 < 4.4.276
Linux ≫ Linux Kernel Version >= 4.5 < 4.9.276
Linux ≫ Linux Kernel Version >= 4.10 < 4.14.240
Linux ≫ Linux Kernel Version >= 4.15 < 4.19.198
Linux ≫ Linux Kernel Version >= 4.20 < 5.4.132
Linux ≫ Linux Kernel Version >= 5.5.0 < 5.10.50
Linux ≫ Linux Kernel Version >= 5.11 < 5.12.17
Linux ≫ Linux Kernel Version >= 5.13 < 5.13.2
Redhat ≫ 3scale Api Management Version2.0
Redhat ≫ Build Of Quarkus Version1.0
Redhat ≫ Codeready Linux Builder Eus Version8.1
Redhat ≫ Codeready Linux Builder Eus Version8.2
Redhat ≫ Codeready Linux Builder Eus Version8.4
Redhat ≫ Openshift Container Platform Version4.6
Redhat ≫ Openshift Container Platform Version4.7
Redhat ≫ Openshift Container Platform Version4.8
Redhat ≫ Virtualization Version4.0
Redhat ≫ Virtualization Host Version4.0
Redhat ≫ Enterprise Linux Aus Version8.2
Redhat ≫ Enterprise Linux Eus Version8.1
Redhat ≫ Enterprise Linux Eus Version8.2
Redhat ≫ Enterprise Linux Eus Version8.4
Redhat ≫ Enterprise Linux For Ibm Z Systems Eus Version8.4
Redhat ≫ Enterprise Linux For Ibm Z Systems Eus S390x Version8.1
Redhat ≫ Enterprise Linux For Power Little Endian Eus Version8.1
Redhat ≫ Enterprise Linux For Power Little Endian Eus Version8.2
Redhat ≫ Enterprise Linux For Power Little Endian Eus Version8.4
Redhat ≫ Enterprise Linux For Real Time Version8.0
Redhat ≫ Enterprise Linux For Real Time For Nfv Version8.0
Redhat ≫ Enterprise Linux For Real Time For Nfv Tus Version8.0
Redhat ≫ Enterprise Linux For Real Time For Nfv Tus Version8.2
Redhat ≫ Enterprise Linux For Real Time Tus Version8.0
Redhat ≫ Enterprise Linux For Real Time Tus Version8.2
Redhat ≫ Enterprise Linux Server Aus Version8.2
Redhat ≫ Enterprise Linux Server Aus Version8.4
Redhat ≫ Enterprise Linux Server For Power Little Endian Update Services For Sap Solutions Version8.1
Redhat ≫ Enterprise Linux Server For Power Little Endian Update Services For Sap Solutions Version8.2
Redhat ≫ Enterprise Linux Server For Power Little Endian Update Services For Sap Solutions Version8.4
Redhat ≫ Enterprise Linux Server Tus Version8.2
Redhat ≫ Enterprise Linux Server Tus Version8.4
Netapp ≫ H300s Firmware Version-
Netapp ≫ H500s Firmware Version-
Netapp ≫ H700s Firmware Version-
Netapp ≫ H300e Firmware Version-
Netapp ≫ H500e Firmware Version-
Netapp ≫ H700e Firmware Version-
Netapp ≫ H410s Firmware Version-
Netapp ≫ H410c Firmware Version-
Netapp ≫ H610c Firmware Version-
Netapp ≫ H610s Firmware Version-
Netapp ≫ H615c Firmware Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.06% | 0.2 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 7 | 1 | 5.9 |
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 6.9 | 3.4 | 10 |
AV:L/AC:M/Au:N/C:C/I:C/A:C
|
CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.