Release Date: | 2021-08-13 |
A use-after-free in function hci_sock_bound_ioctl() of the Linux kernel HCI subsystem was found in the way user calls ioct HCIUNBLOCKADDR or other way triggers race condition of the call hci_unregister_dev() together with one of the calls hci_sock_blacklist_add(), hci_sock_blacklist_del(), hci_get_conn_info(), hci_get_auth_info(). A privileged local user could use this flaw to crash the system or escalate their privileges on the system. This flaw affects the Linux kernel versions prior to 5.13-rc5.
See more information about CVE-2021-3573 from MITRE CVE dictionary and NIST NVD
NOTE: The following CVSS v3.0 metrics and score provided are preliminary and subject to review.
Base Score: | 6.4 | Base Metrics: | AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H |
Access Vector: | Local network | Attack Complexity: | High |
Privileges Required: | High | User Interaction: | None |
Scope: | Unchanged | Confidentiality Impact: | High |
Integrity Impact: | High | Availability Impact: | High |
Platform | Errata | Release Date |
Oracle Linux version 6 (kernel-uek) | ELSA-2022-9348 | 2022-05-03 |
Oracle Linux version 7 (kernel) | ELSA-2022-0620 | 2022-02-23 |
Oracle Linux version 7 (kernel-uek) | ELSA-2021-9450 | 2021-09-16 |
Oracle Linux version 7 (kernel-uek) | ELSA-2021-9460 | 2021-09-22 |
Oracle Linux version 7 (kernel-uek) | ELSA-2021-9485 | 2021-10-14 |
Oracle Linux version 7 (kernel-uek) | ELSA-2022-9348 | 2022-05-03 |
Oracle Linux version 7 (kernel-uek-container) | ELSA-2021-9451 | 2021-09-16 |
Oracle Linux version 7 (kernel-uek-container) | ELSA-2021-9458 | 2021-09-22 |
Oracle Linux version 7 (kernel-uek-container) | ELSA-2021-9488 | 2021-10-14 |
Oracle Linux version 8 (kernel) | ELSA-2021-4356 | 2021-11-16 |
Oracle Linux version 8 (kernel-uek) | ELSA-2021-9450 | 2021-09-16 |
Oracle Linux version 8 (kernel-uek-container) | ELSA-2021-9451 | 2021-09-16 |
Oracle VM version 3 (kernel-uek) | OVMSA-2022-0014 | 2022-05-03 |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team